X
Tech

Demo 2006 security roundup, part 2

Demo 2006: Persystent Technology demoed the latest version of it enterprise software, which ensures PC availability by eliminating configuration problems. It maintains a hidden partition—a compressed bit image--with the clean OS, registry and application settings--and at boot time corrects any errors that have been introduced.
Written by Dan Farber, Inactive

Demo 2006: Persystent Technology demoed the latest version of it enterprise software, which ensures PC availability by eliminating configuration problems. It maintains a hidden partition—a compressed bit image--with the clean OS, registry and application settings--and at boot time corrects any errors that have been introduced. If you have a virus, spyware or mess with the registry--suffer the usual configuration creep—Persystent brings you back to the clean state. On the back end, Persystent has policy and management tools for managing desktops and allowing configuration changes. The list price for the client is $99 and the server, $2,995.

Tested Technologies demoed Hyperblocking-IPS, which makes enterprise, home and cellular networks networks invisible to hackers. The hyperblocking technology--which company founder and President Matthew Von-Maszewski called a "tiny bit of lethal software"--identifies and blocks transmissions emanating from harmful IP addresses based on IP attributes. When the software is installed on devices, it communicates with a central server that traces the originating IP address, compares it to a local database of IP address attributes, then makes a determination if the machine is a threat, according to the company. If the IP address is a bad actor, the network goes dark to the intruder. Hyperblocking-IPS will be available for Linux, Solaris and Windows, and a version that works with most firewalls is in the works.  It sound goods, but it won't it has the same problem as other security products--staying ahead of the malicious hackers.

IronPort Systems added as set of Web security appliances, leveraging the core technology--such as SenderBase Web Reputation Filters--and high performance characteristics of in its line of email security appliances.  The S-Series Web Security Appliances, due this summer,  include secure application proxies for HTTP, HTTPS and FTP, and a scanning and vectoring engine. A layer 4 traffic monitor scans all ports and protocols at wire speed,. The company claims a 10x increase in scanning throughput over first generation solutions.

Front Porch showed a unique security application that lets ISPs automatically notify compromised customers of security breaches or if they land on phishing sites. PorchLight Security Messaging Technology integrates with an ISP's security infrastructure and sends ISP-branded notifications, as well as instructions for removing threats, directly to the browsers of the users with infected machines. The technology could be applied to corporate, campus municipal WiFi networks. Porchlight could also be used to send alerts when university students violate network terms of service, such downloading music from unauthorized sites. 

Tivoli founder Bob Fabbio launched Cesura, a managed service for business optimization. He described the service as a "systematic way to provide certainty." Cesura's appliance monitors the user experience within an enterprise, and when a user is having problems a notification is sent to the IT department and to Cesura's operations center where the company's staff deal with the problem. Cesura's secret sauce is what it calls Business Certainty Analytics that handles disruptions and reports on compliance and prevention strategies. The company claims that its solution results in up to 50 percent fewer disruptions and up to 80 percent faster recovery. Given Fabbio's track record, it's worth a look.

Astav showed SignSafe, two-factor authentication servers that dials your phone when you make purchases, and then asks for a password to authentice your identity to conclude the transaction. Don't leave home without your phone...

Editorial standards