Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Peakflow X IPS Points Finger at User

    Written by

    Cameron Sturdevant
    Published February 20, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Arbor networks has added user-level tracking, SNMP polling and a handful of other features to Peakflow X, enhancing the internal IPS ability to assist network managers in hunting down troublesome or unauthorized network clients.

      Click here to read the full review of Peakflow X 3.4.

      2

      Arbor networks has added user-level tracking, SNMP polling and a handful of other features to Peakflow X, enhancing the internal IPS ability to assist network managers in hunting down troublesome or unauthorized network clients.

      Released Jan. 11, Peakflow X 3.4, which costs $60,000, is a 2U (3.5-inch) appliance that sits in the network to monitor traffic. Because Peakflow X is part of the behavior anomaly detection family of internal intrusion prevention systems, it quietly monitors and “learns” what normal network operations look like. When an anomaly is detected—for example, when an end-user system accesses a particular server at an odd time—Peakflow X alerts network operations personnel.

      But Peakflow X is the first internal IPS weve seen that combines network behavior anomaly detection with what amounts to signature-based detection tools.

      In this version of Peakflow X, Arbor Networks has added ATF (Active Threat Feed), a service that provides Peakflow X policies created by Arbor Networks staff. We configured our Peakflow X system to look for new ATF data every hour. ATF policies, which are developed using Arbor Networks honey pots and service provider protection solutions, are provided as part of the service contract at no additional charge.

      During the time we spent testing Peakflow X, the ATF policies we downloaded didnt specifically lead to the detection of any network attacks. However, a preconfigured ATF policy did bust a user who was trying to access forbidden (as configured on our test network, anyway) Yahoo Internet e-mail.

      New in this version of Peakflow is the ability to identify nonconforming traffic down to the individual user.

      Most internal IPS solutions weve seen have no trouble connecting bad traffic to individual machines, but we havent used one yet that provided user-level identification.

      To use this feature, which works only when user data is stored in Microsofts Active Directory or when the user identification data is available from a DHCP (Dynamic Host Configuration Protocol) server, we installed Peakflow agent software on our Microsoft Windows Server 2003 Active Directory system.

      The installation process created a service on the Windows server that initiated an encrypted connection to the Peakflow X appliance. Active Directory provided user-to-IP-address mapping that was then displayed in traffic reports on the Peakflow management system.

      Although we dont think that user-level identification is so important that IT managers already using Peakflow X should immediately upgrade, we did see value in connecting user names to suspect network traffic. And the effort to get user details associated with network activity was minimal—we had the whole thing installed in less than 5 minutes.

      We did, however, have a bit of confusion during installation when we had to import a digital certificate from the AuthX agent install into our Active Directory server to facilitate the encrypted connection.

      Peakflow X should be considered a critical piece of the network management infrastructure, so the addition of SNMP management features is welcome. With Version 3.4 of Peakflow, we were able to keep tabs on general Peakflow X availability through our Hewlett-Packard OpenView NNM (Network Node Manager) console using SNMP traps.

      This capability is especially important for Peakflow X operations because the product must be up and running continuously for its base-line and anomaly detection functions to work correctly. And, because Peakflow X is not an in-line device, it might not be readily apparent to operations staff if the appliance were to go down.

      It took almost no time to add the Peakflow X appliance to our NNM console. In fact, Peakflow X fit neatly into our test network without requiring any reconfiguration of routes or network infrastructure equipment. Network operators will likely spend much more time on Peakflow X policies and network traffic reports than actually installing the device in the network.

      However, like nearly all its competitors, Peakflow X requires a connection to a monitoring switch port or access to a mirroring network tap so that it can see all network traffic.

      Similar to most network behavior analysis products, Peakflow X acts like a network traffic analyzer on steroids—it collects huge amounts of flow data about network activity.

      We therefore appreciated the fact that the product allowed us to designate a variety of access levels to this sensitive data, allowing, for example, junior operators to see troubleshooting data without being able to modify the policies that generated the reports.

      Next page: Evaluation Shortlist: Related Products.

      Page 3

      Evaluation Shortlist

      Captus Networks Captus IPS 4000 Uses policies based on desired performance to govern network use (www.captusnetworks.com)

      ForeScout Technologies CounterAct Sits inside the network and watches for worms and other bad network traffic to squelch (www.forescout.com)

      Lancopes StealthWatch XE Uses flow data from network infrastructure products to monitor and alert administrators to unusual behavior (www.lancope.com)

      Mazu Networks Mazu Profiler Develops a base line, or profile, of normal network behavior and alerts admins when an anomaly is detected; product is very close in functionality to Peakflow X (www.mazunetworks.com)

      Technical Director Cameron Sturdevant can be contacted at [email protected].

      Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Cameron Sturdevant
      Cameron Sturdevant
      Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected].

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.