Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Networking

    PacketHound Gets New Tracking Abilities

    By
    Dennis Fisher
    -
    August 13, 2002
    Share
    Facebook
    Twitter
    Linkedin

      Palisades Systems Inc. on Tuesday introduced a new version of its PacketHound security and monitoring appliance, adding new reporting and tracking capabilities.

      The appliance operates in passive mode and sits in the network traffic flow, monitoring inbound and outbound connections, much as a firewall does. The difference is that PacketHound uses a database of signatures to look for application usage instead of monitoring TCP ports the way that firewalls do.

      The appliance will find and block applications or protocols that the administrator has identified as undesirable. It does so by injecting into the traffic flow a reset packet, which then closes the offending connection. The system can also allow certain types of traffic through and then kill the connection once the traffic reaches a certain bandwidth threshold.

      The idea is to cut down on bandwidth costs and security risks produced by users connecting to file-sharing networks, Web sites that deliver streaming media and other potentially time-consuming applications.

      “Its meant to be complementary to a firewall,” said Eric Schnack, chief operating officer at Palisades Systems, based in Ames, Iowa. “We take a different approach, and look for application usage by detecting signatures in the traffic flow.”

      PacketHound 2.2 adds new tracking functionality capable of presenting information on rogue connections down to the packet level. It gathers data on the number of bytes and packets, the duration of the connection and the number of active and terminated connections.

      All of the data is presented in a GUI on the administrators desktop. There is also a new feature that produces a real-time list of the top 10 Web sites users are visiting, giving management a convenient list of targets to block.

      The system comes with more than 70 pre-defined rules that enable administrators to manage or block such applications as AOL Instant Messenger, Gnutella, Hotmail and others. Customers can also write custom rules to block other troublesome applications or protocols.

      PacketHound 2.2 is available now, and pricing starts at $2,600.

      • More Security Coverage
      Dennis Fisher

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×