Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    UnityOne Foils Attacks

    By
    Cameron Sturdevant
    -
    March 29, 2004
    Share
    Facebook
    Twitter
    Linkedin

      TippingPoint Technologies Inc.s UnityOne-1200 ably handled both real and staged attacks on eWEEK Labs test network, attached to the Internet for nearly a week, earning the IPS appliance an Analysts Choice award. However, given the high price of the technology, we recommend that IT managers begin any intrusion prevention system evaluation with a comprehensive vulnerability scan to determine the scope and severity of the security problem.

      Click here to read the full review of UnityOne-1200.

      2

      TippingPoint Technologies Inc.s UnityOne-1200 ably handled both real and staged attacks on eWEEK Labs test network, attached to the Internet for nearly a week, earning the IPS appliance an Analysts Choice award.

      However, given the high price of the technology, we recommend that IT managers begin any intrusion prevention system evaluation with a comprehensive vulnerability scan to determine the scope and severity of the security problem.

      The UnityOne appliance family ranges in throughput from 200M bps to 2G bps and in cost from $24,995 to $89,995. The UnityOne-1200 device that eWEEK Labs tested has 1.2G bps of throughput and costs $64,995.

      All UnityOne appliances include built-in, Web-based Local Security Manager software. A $9,995 Security Management System appliance can be acquired for additional management capabilities or for managing more than one UnityOne appliance.

      During tests, we put the UnityOne-1200, updated last month, in front of our perimeter firewall, in line with all network traffic. Any traffic the UnityOne-1200 deemed “bad” was immediately dumped from the network before it reached the firewall.

      Hardware advances have made intrusion prevention more compelling, but our tests show that TippingPoint also has made significant improvements in the logic used to analyze traffic and has a good understanding of how to implement security policies.

      Even so, the UnityOne-1200 requires fairly significant and ongoing tuning to achieve optimum protection. Constantly changing and emerging network threats will require that IT managers make decisions about default settings when TippingPoint makes one of its Digital Vaccine updates available.

      For example, during tests, many of the recommended protection settings for several SNMP reconnaissance probes were set to “permit and notify.” With this setting, the initial vulnerability scan performed by Counterpane Internet Security Inc. engineers (see Real-world attacks put UnityOne to the test) identified several SNMP configuration weaknesses in our infrastructure. We worked with TippingPoint engineers to change the UnityOne-1200 rule sets to “block and notify” when these reconnaissance probes were discovered.

      However, for the vast majority of attack signatures and evaluative rules, the setting recommended by TippingPoint worked fine in rebuffing probes and DoS attacks on our test network.

      We left our WatchGuard Technologies Inc. Firebox V80 firewall in place while testing the UnityOne-1200. Although the UnityOne-1200 performs stateful packet inspection, it is not intended to replace the VPN capabilities and other access policies of the firewall. We used firewall logs to monitor for any leaks in the UnityOne-1200, and no attacks were detected during a week of testing.

      We made only minor changes during installation of the UnityOne-1200 and then let Counterpane run a security-scanning session overnight. Probes usually are not attacks but rather precursors to possible attacks, so we did not initially block reconnaissance of our test network. After Counterpane identified several WebDAV (Web-based Distributed Authoring and Versioning) buffer overflow vulnerabilities along with a host of DLL problems, we spent several hours tuning the UnityOne-1200 to block any attack on these vulnerabilities. After subsequent scans, we were able to close security holes with minimal effort.

      Although the UnityOne-1200 ran with almost no ongoing oversight on our part, IT managers should plan to put at least one or two staff members in charge of accessing and configuring the rule sets. During testing, we found the user interface somewhat confusing even after performing procedures several times in a row. This is especially true for distributing new Digital Vaccines as they become available from TippingPoints Threat Management Center.

      The Security Management System appliance can automate much of the update process, but we think that IT staffers will have to spend at least several hours reviewing the updates and the recommended actions that TippingPoint assigns to the Digital Vaccine rules. However, this is time well-spent, considering that properly configured rules will likely prevent Internet-based attacks that could result in revenue loss and tie up hours of IT staff time.

      Cameron Sturdevant
      Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at cameron.sturdevant@quinstreet.com.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×