Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Latest News
    • Networking

    Securify Nabs Intruders

    Written by

    Cameron Sturdevant
    Published January 20, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Securify Inc. has revamped its SecurVantage packet sniffer, adding an enterprise management console and automatic policy generation, enhanced reporting, and better alert management— improvements that make the product a top contender in the emerging space of network security management.

      SecurVantage monitors are connected to the span port of switches in the network, and they scan traffic for unauthorized packets. The monitors send alerts to the central console in real time. We defined specific events such as FTP traffic as critical alerts. Critical alerts caused our Enterprise console to send an SNMP trap alert to our Hewlett-Packard Co. OpenView Network Node Manager console. This kind of interoperability is essential for enterprise-class products.

      SecurVantage can also send e-mail or pages to a person. During tests at our San Francisco Labs facility, in conjunction with a Securify monitor at the PC Magazine Labs in New York, we found that the new enterprise management console worked smoothly.

      SecurVantage is distinguished from other products because it can identify application layer traffic, specific servers and users on the network. The product uses policies to flag unauthorized traffic. Because the product does not affect network traffic—in other words, SecurVantage does not make new policies for firewalls or routers—it does not interfere with new traffic. For example, during tests, we authorized only HTTP traffic on a network segment. When we subsequently executed an FTP file transfer, we got an alert on our console about the violation.

      This is in contradistinction to the tack taken by competitive products such as Lancope Inc.s StealthWatch or Symantec Corp.s ManHunt (part of the Recourse Technologies Inc. acquisition). These products monitor the network for several weeks or even months to generate a profile of normal network traffic and system behavior. When anomalies are detected, an alert is sent. Some of these products can also suggest policy changes that enable network equipment to stop suspected attacks.

      eWeek Labs tests of SecurVantage showed that although it allowed us to quickly create policies, it must be fine-tuned to really scope out networks—and that fine-tuning takes time. Depending on how often applications and traffic change on the network, tweaking SecurVantage could take as long as working with one of these other products.

      In addition, IT managers will need to devote a high-level security manager to the initial setup. Initial policy creation takes only minutes, but we suggest reviewing traffic rules to minimize the number of false-positive alerts. This takes time and expertise.

      SecurVantage started shipping in November and starts at $40,000, which is in line with other products in this category. IT managers should keep in mind that Securify is a relatively new company that has its roots in consultancy. But despite the relative youth of the product, we had only minor problems with the setup—including a mismatch in system times that caused one display to read incorrectly. Once the system times were matched, the problem was resolved.

      We tested a version of SecurVantage that is shipped on a 1U (1.75-inch) Dell Computer Corp. 1650 server with 1GB of RAM and a 750MHz processor. We used seven of these servers in our tests, with two of the seven at sister publication PC Magazine, in New York, configured as a SecurVantage Monitor. We configured four more 1650s as two monitors at eWeek Labs. The SecurVantage Enterprise Manager was also installed on one Dell box at the San Francisco Labs offices. We connected each monitor to a traffic mirror port on our Cisco Catalyst 2900XL switches.

      We placed the SecurVantage monitors as close to the edge of the test network as possible to maximize the amount of traffic the monitors saw.

      With the assistance of a Securify consultant, we used a module of the product called SecurVantage Studio to create monitoring rules. We captured network traffic and then ran it against the rules we made in Studio to see the results before putting the rule into production—a very cool capability. This is a good facility to help minimize the number of false-positive alerts, always a good thing in network management tools.

      After creating rules, it was a simple process to centrally distribute them to the various SecurVantage monitors. Each of the monitors tracked traffic behavior for its policy domain, a Securify term for the portion of the monitored network. Enterprise Manager transmitted rules to the monitors via Secure Sockets Layer encryption, using security certificates on both the Enterprise Manager and the monitor. Organizations that use public-key infrastructure can incorporate SecurVantage into their existing system without much trouble. We think this is a satisfactory method for ensuring that bad actors dont modify the traffic monitors. The systems run a hardened version of Red Hat Inc.s Red Hat Linux 7.2 that is optimized for network management performance.

      We used an Ixia Inc. Ixia 1600 traffic generator to lay down large amounts of traffic on our network. In addition, we layered traffic from NetIQ Corp.s Chariot traffic generation tool to provide enough traffic for SecurVantage to generate its traffic policies.

      Despite the high traffic rates on the test system, SecurVantage was able to spot all the unauthorized traffic that we tried to sneak onto the network.

      Senior Analyst Cameron Sturdevant can be reached at [email protected].

      Executive Summary

      : SecurVantage 3.0″>

      Executive Summary: SecurVantage 3.0

      Usability

      Good

      Capability

      Good

      Performance

      Excellent

      Interoperability

      Good

      Manageability

      Good

      Scalability

      Good

      Security

      Good

      Securifys product monitors network traffic and sends alerts when unauthorized packets are detected. Initial policies are generated automatically and then must be fine-tuned by a security manager working closely with network and systems administrators.

      COST ANALYSIS

      SecurVantages initial purchase price is in the ballpark with other traffic monitoring tools, but IT managers mustnt think the automatic policy generator is going to let them off easy. Policies need to be tweaked and maintained each time new applications are added to the network.

      (+) Detects “bad” traffic quickly; identifies and tracks application layer traffic, specific servers and users.

      (-) Long learning curve required to fine-tune rules.

      EVALUATION SHORT LIST

      • Lancopes StealthWatch
      • Symantec Corp.s ManHunt
      • IntruVert Networks Inc.s IntruShield
      • www.securify.com
      Cameron Sturdevant
      Cameron Sturdevant
      Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected].

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.