Network Data-Stream Protection

By Andrew Garcia  |  Posted 2005-04-11 Print this article Print

As increased device and user mobility dissolve the network perimeter as we know it, the need to provide at-connection system and user verification and validation is imperative.

WINNER Vernier Networks Inc.
Adaptive Security Platform 1.0

As increased device and user mobility dissolve the network perimeter as we know it, the need to provide at-connection system and user verification and validation is imperative. With a powerful combination of user, traffic and endpoint controls, Vernier Networks Adaptive Security Platform 1.0 stood tall as the winner in a formidable field of entries.

For a list of all the winners and finalists of the fifth annual eWEEK Excellence Awards, click here.
With ASP 1.0, Vernier ( has leveraged its experience in providing admission controls to wireless networks and increased the functionality and performance to encompass and protect wired clients as well. Authentication controls ensure that only known users can access permitted resources. A framework to leverage third-party tools for vulnerability assessment and remediation maintains a level of assurance that client machines are not malware-infected. In-line scans identify attack patterns in network traffic and automatically quarantine the offending host until the problem is addressed.

ASP 1.0 does not require an endpoint agent and will therefore support any networked device, maintaining quarantine until identity and system status are confirmed.

With an eye to the future, Vernier has partnered with Microsoft Corp. to support the latters nascent Network Access Protection technology.


Mazu Networks Inc.
Mazu Profiler 5.0

With its intelligent networkwide behavioral detection capabilities and its easily scalable hardware architecture, the Mazu Profiler 5.0 differentiates itself from the plethora of available intrusion prevention devices.

Profiler uses behavioral heuristics to protect networks against zero-day attacks. Through constant dynamic network base lining and the reliance on multiple traffic profiles for different time scenarios, Profiler greatly reduces the incidence of false positives. And mitigation planning tools allow administrators to gauge a remediation plans impact on normal network performance—before inadvertently causing other problems.

More information is at

Teros Inc.
Teros 200 5.0

Web application firewalls provide the deepest layers of protection for Web servers and Web applications against all manner of Web- and database-specific attacks. Teros ( 200 stands out for its fine zero-day defenses and HTTP protocol defenses.

In addition to protecting against attacks, the Teros 200 monitors protocol conformance to avoid new plagues. With its accelerated SSL (Secure Sockets Layer) decryption technology, the Teros 200 can analyze and filter encrypted traffic as well.

The Teros 200 features redundant components to maximize system uptime, and it can protect as many as 20 Web servers from attacks, Web site defacement and information leakage.

Excellence Awards Winners and Finalists:
  • Analytics & Reporting
  • Application Development
  • Business Integration Systems
  • Business Relationship Management
  • Desktop & Mobile Hardware
  • E-Business Foundations
  • E-Mail Management & Security
  • Enterprise Collaboration & Messaging
  • Enterprise Storage Hardware
  • Enterprise Storage Software
  • IT Quality Assurance Tools
  • Productivity Applications
  • Server Hardware
  • Networking & Management Tools
  • Networking Infrastructure
  • System & Application Management
  • Authentication & User Management
  • Network Data-Stream Protection
  • Vulnerability Assessment & Remediation
    Andrew cut his teeth as a systems administrator at the University of California, learning the ins and outs of server migration, Windows desktop management, Unix and Novell administration. After a tour of duty as a team leader for PC Magazine's Labs, Andrew turned to system integration - providing network, server, and desktop consulting services for small businesses throughout the Bay Area. With eWEEK Labs since 2003, Andrew concentrates on wireless networking technologies while moonlighting with Microsoft Windows, mobile devices and management, and unified communications. He produces product reviews, technology analysis and opinion pieces for, eWEEK magazine, and the Labs' Release Notes blog. Follow Andrew on Twitter at andrewrgarcia, or reach him by email at

    Submit a Comment

    Loading Comments...
    Manage your Newsletters: Login   Register My Newsletters

    Rocket Fuel