Enterprise Resource Protection

By Timothy Dyck  |  Posted 2012-04-30 Print this article Print

Entries in this category are designed to ensure that IT data and computing resources are used only by authorized personnel in approved ways.

Entries in this category are designed to ensure that IT data and computing resources are used only by authorized personnel in approved ways. As in previous years, this was a large category, with almost 100 contenders vying for enterprise IT mind share and dollars. The two finalists and winner emphasize proactive security defenses, helping to ensure that vulnerabilities dont degrade into full-blown problems.


FoundScan Vulnerability Management System 2.5

Foundstone Inc.s FoundScan Vulnerability Management System 2.5 stood out for its ability to maximize precious human resources. The enterprise security scanner can scan millions of IP addresses and tens of thousands of devices a day, looking for unpatched or newly added systems. When problems are detected, FoundScan takes the critical next step of problem documentation and remediation. It generates a trouble ticket for the security warning (a custom API is available to integrate these tickets into help desk systems), and the ticket cannot be closed until a subsequent scan of the same system verifies that the applied fix was correctly applied.


InterDO 2.5

KaVaDo Inc.s InterDo 2.5 Web application firewall rose to finalist status for its ability to protect Web applications from a wide variety of attacks. Like StormWatch, the other finalist in this category, InterDo does not use signatures but instead dynamically monitors Web application usage to detect illegal or invalid HTTP requests. The program tracks Web client activity and blocks any requests that are not already known to be possible valid responses to any particular Web page. InterDo automatically checks incoming HTTP form parameters to look for possible attacks and has the ability to dynamically inspect SOAP Web service calls to block suspected attacks.

StormWatch 3.1

Okena Inc.s StormWatch 3.1 was selected as a finalist for its ability to protect servers and client systems from security exploits, even when systems are left unpatched. The kernel-level application firewall provides systemwide buffer overflow protection and prevents critical system files and settings from being changed, even when a security vulnerability provides what would otherwise be system-level access. StormWatch also provides centralized administration, log consolidation and policy creation so that large numbers of systems can be managed from a single location. (Cisco announced its intention in February to buy Okena.)

Excellence Awards Winners and Finalists:
Timothy Dyck is a Senior Analyst with eWEEK Labs. He has been testing and reviewing application server, database and middleware products and technologies for eWEEK since 1996. Prior to joining eWEEK, he worked at the LAN and WAN network operations center for a large telecommunications firm, in operating systems and development tools technical marketing for a large software company and in the IT department at a government agency. He has an honors bachelors degree of mathematics in computer science from the University of Waterloo in Waterloo, Ontario, Canada, and a masters of arts degree in journalism from the University of Western Ontario in London, Ontario, Canada.

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel