Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    New IDS Tools Automate Response

    Written by

    Dennis Fisher
    Published November 11, 2002
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      New security event management products are on tap from a variety of developers this week that some say could eliminate the need for host-based IDS by not only detecting intrusions but by also responding to them.

      The releases from e-Security Inc., GuardedNet Inc. and Securify Inc. are among the first to go beyond the current log-aggregation role of existing security event management software and give administrators the ability to prioritize and respond to attacks in real time.

      E-Security and Securify will make their announcements at this weeks Computer Security Institute show in Chicago. Such capabilities give the products a clear advantage over traditional host-based intrusion detection system software, experts say.

      “Now people can start doing the work they should have always been doing in prioritizing their assets,” said Pete Lindstrom, an analyst at Spire Security LLC, an analyst company based in Malvern, Pa. “That level of intelligence is crucial. Security event management can eventually replace the need for host IDS. Its more important to threat management than IDS.”

      E-Security plans to unveil its Advisor product, which includes Symantec Corp.s SecurityFocus Vulnerability Database and is the third product in a suite that also includes e-Sentinel and e-Wizard. Advisor collects incident data from the e-Wizard sensors and then compares it against the SecurityFocus Vulnerability Database to look for matches against known vulnerabilities. The software then produces a detailed report showing the specifics of the attack, its severity rating, which vulnerabilities it exploited and which machines on the network are affected.

      The report includes remediation advice and a link to the vendors patch for each vulnerability. “Just telling someone that theyve been attacked isnt enough anymore. Presenting the data and doing something with it is the way things are going,” said Joe Payne, president and CEO of e-Security, based in Rockledge, Fla.

      Securify, of Mountain View, Calif., takes a slightly different approach to the problem with its new SecurVantage 3.0 release. Instead of collecting alerts from agents spread across the network, the software uses a new feature called Automatic Policy Generation to take a snapshot of the networks traffic over a given period of time. It then develops policies—which administrators can change at any time—about what the acceptable behavior for each device is and treats any other traffic moving in or out of that device as malicious.

      The system comprises three discrete pieces: Studio, Monitor and Enterprise. Incident data is collected by Secur- Vantage Monitor and passed to the Enterprise component for aggregation and analysis. The Studio piece enables administrators to develop custom policies. This concept of security based on a “white list” of whats acceptable instead of a database of attack signatures makes the system more flexible and effective, users say.

      “With a firewall, you block packets. With an IDS, its looking for specific signatures, and theyre geared to the latest attack,” said Adam Hansen, lead information security engineer at Sonnenschein, Nath & Rosenthal, a Chicago law firm and a Securify customer. “This fills a different void.”

      For its part, GuardedNet will release NeuSecure 1.6, which includes an updated business rules engine that enables users to write their own stateful rules. There is also a new analytics package with a tool for creating custom reports. NeuSecure, unlike many security event management tools, does not place an agent on each device. Instead, it uses its Event Aggregation Module to distill all the incoming events into usable data, which is then passed to the Central Management System for correlation, analysis and prioritization. The agentless architecture is designed to make deployments faster and improve scalability, officials said.

      “The winner is going to be the one that can scale,” said Tom McNeight, CEO of Atlanta-based GuardedNet. “We havent found any upper limit on the amount of traffic our system can handle.”

      Dennis Fisher
      Dennis Fisher

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×