By Security News Desk | Article Rating: |
|
November 9, 2004 12:00 AM EST | Reads: |
9,629 |
While the number and frequency of virus attacks rises, what has remained constant is the point of entry most viruses use to gain access to computers. Over 95% of security culprits are common vulnerabilities and exposures (CVEs).
PredatorWatch's Auditor 128, for SMBs, reinforces those areas most likely to cause security vulnerabilities. Auditor 128 is designed to offer the same security coverage that large enterprises have. The small security appliance is able to do so by bringing together critical measures, including the detection of wired and wireless devices, audits of network assets, automated Windows OS patching, security policy building tools, and confidential regulatory compliance reporting.
The technology in Auditor 128, according to PredatorWatch, is the same grade as what the company provides its large, corporate customers like IBM. The security device is the first that can be customized for particular organizational requirements.
Auditor 128 is comprised of SmartScan technology, the world's fastest network security auditing and vulnerability assessment engine, software plug-ins and a subscription service. At the heart of the small security appliance is Linux, automating the discovery and tracking of all network assets, and dynamically detecting devices connected to the network.
Auditor can audit up to 256 IP addresses and share this information with a firewall. If a vulnerability is detected in any of the devices, Auditor 128 can block traffic to and from the device until it is secured. IT managers can keep track of equipment thanks to inventory reports Auditor sends out.
The security device performs its job in a low-key manner. The plug-ins that come with Auditor 128 include policy building tools, and the ability to run confidential reports for compliance with regulations such as GLBA, HIPAA, FDA CFR 21 Part 11, and Sarbanes-Oxley Part 404. The subscription service automatically updates the security device based on the latest federally funded list of CVEs kept by the MITRE Corporation. Customers can selectively update plug-ins and other features as they see fit.
As mobility grows and wireless devices grow, it becomes increasingly important to know who is accessing company's' networks, and with what. Phebe Waterfield, security analyst with the Yankee Group, noted, "IT and network managers need to know who's accessing their network, when, and with what device. Enterprises need to control how mobile devices connect to the network, and make sure they are not vulnerable to virus or worm infection. Auditor 128 automatically detects laptops and rogue wireless devices and can share this information with other security tools to perform manual and automated remediation. Visibility and more automated remediation of network vulnerabilities are significant steps forward for small- to mid-sized networks; finally advanced network security tools are available for a smaller network."
With Auditor 128 audits devices it does not matter what operating system is in use, and it is compatible with Novell Netware. PredatorWatch CEO, Gary Miliefsky, said the company's security device for SMBs will change the face of security. "Auditor 128 is changing the way small- to medium-size networks are secured," he said.
Published November 9, 2004 Reads 9,629
Copyright © 2004 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Security News Desk
SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.
Feb. 22, 2019 12:30 PM EST |
By Zakia Bouachraoui Feb. 22, 2019 11:45 AM EST |
By Zakia Bouachraoui ![]() Feb. 22, 2019 11:00 AM EST |
By Pat Romanski Feb. 22, 2019 10:00 AM EST |
By Zakia Bouachraoui Feb. 22, 2019 07:00 AM EST |
By Yeshim Deniz Feb. 21, 2019 04:30 AM EST |
By Zakia Bouachraoui ![]() Feb. 19, 2019 04:15 PM EST |
By Yeshim Deniz ![]() Feb. 18, 2019 07:45 AM EST |
By Zakia Bouachraoui Feb. 17, 2019 05:00 PM EST |
By Elizabeth White ![]() Feb. 16, 2019 04:45 PM EST Reads: 14,062 |