Symantec bolsters Network Access Control software

Symantec upgrades Network Access Control software
Symantec Corp. announced it has extended its Symantec Network Access Control software with features to enforce network access control across managed and unmanaged endpoints. It offers remote scanning in addition to both persistent and dissolvable agents. Also, agentless NAC enforcement, Mac OS X agent support and an integrated 802.1X supplicant in a single product.

The addition of Symantec Network Access Control Scanner’s agentless assessment functionality provides an enterprise with a third means to evaluate or assess the health of endpoints connecting to their networks. This includes endpoints not managed by the organization, such as guest users, non-Windows endpoints (i.e. UNIX systems) and networked devices (i.e. printers).

This version of Symantec Network Access Control 5.1.5 is expected to be available in February 2007 directly and through the network of Symantec’s channel partners, and worldwide in March 2007.

Third Brigade protects enterprise servers from cyber attacks

Third Brigade unveiled Deep Security 5, a host intrusion prevention system that detects and prevents known and zero-day attacks.

Third Brigade Deep Security brings network security, including firewall and intrusion detection and prevention, down to individual computers and devices. It shields vulnerabilities in Windows, Linux and Unix operating systems, as well as enterprise and Web applications that make up a data centre.

Key Features

  • Recommendation scan – Identifies applications running on hosts and recommends which intrusion prevention filters should be applied to them
  • Role-based access – Allows multiple administrators, each with different levels of permission.
  • Enriched reporting – A selection of detailed reports document attempted attacks, and includes a forensic report that provides an auditable history of security configurations and changes.
  • Risk ranking – Security events can be viewed based on asset value as well as vulnerability information.
  • Optimized filtering – Advanced capabilities for dealing with streaming media
  • Application protection – Includes out-of-the-box vulnerability protection for over 100 applications

Third Brigade continues to protect the broadest range set of platforms, including Microsoft Windows 2000, Windows XP, Windows Vista, SUSE Linux Enterprise 9 and 10 from Novell, Red Hat Enterprise Linux 3 and Red Hat Enterprise Linux 4, Solaris 8, 9 and 10 on SPARC

Third Brigade Deep Security 5 is available in April. The product may be purchased directly from the company or through authorized resellers. For more information, please visit or call 866-373-6977.

CA provides centralized protection against online threats
CA announced CA Host-Based Intrusion Prevention System (CA HIPS), a solution that combines advanced firewall, intrusion detection and intrusion prevention capabilities to defend enterprise computing assets against blended threats.

CA HIPS monitors both incoming and outgoing traffic and enables centralized management of access control policies.

CA HIPS provides host-based security to counter zero-day attacks by detecting anomalies in system behaviour. Administrators can define rules for automatically responding to these anomalies, such as blocking suspicious application activity with the rest of the network until a potential threat can be evaluated fully.

Threat events are logged to assist with compliance, reporting and investigations. CA HIPS can also detect patterns in these events to help uncover whether a potential security issue exists or whether modifications must be made to existing security policies to allow the activity to continue.

Pricing for CA HIPS starts at US$40 per seat. It is available primarily through authorized CA resellers.


Route1 unveils MobiNET Aggregation Gateway

Route1 Inc. announced the MobiNET Aggregation Gateway (MAG). MAG is an appliance-based solution that provides enterprises subscribing to Route1 MobiNET-enabled services, such as remote access.

MAG provides a number of key features, including:

  • Audit functions
  • Reporting
  • Load balancing and failover

When a MAG is installed in the DMZ (demilitarized zone) or edge of the network, all data communications are sent directly to the MAG and then aggregated and synchronized with MobiNET through an encrypted Transport Layer Security (TLS) tunnel. When a MobiKEY is used to access digital resources, the data session is run directly through the MAG. Initial authentication and authorization is facilitated through the MobiNET and managed PKI, with MAG providing another layer of security controls for additional data communications.

MAG will begin shipping in the second quarter of 2007.

Alloy Software announces enhanced version of Alloy Navigator IT service desk management suite
Alloy Software Inc. announced the release of Alloy Navigator 5.2 – an enhanced version of IT service desk management suite. The Alloy Navigator 5.2 provides features and functionality to automate IT service and support operations as well as other business-critical processes. Some of the features in Alloy Navigator 5.2 include advanced workflow, support for recurring and global tickets, enhanced software licence compliance and a customizable sidebar for agents to customize and personalize their work environments.

Alloy Navigator’s advanced workflow automation functionality supports parent/child dependencies. This enables seamless tracking of support processes such as problem management and change management. In addition, the Work Order functionality for task management facilitates handling of activities and projects such as the tasks associated with hiring a new employee, updating a server and migrating applications, etc.

Alloy Navigator 5.2 also includes enhanced software licence compliance with improved reporting functionality. This allows users to identify any disparity between purchased software licences and actual installations.

Other features of Alloy Navigator 5.2 include improvements to email management, knowledge management and the Web Portal. The Web Portal now supports service level agreements (SLAs) based on priority and due dates built-in to the tickets. It also allows users to browse the knowledge base by company-defined categories. Alloy Navigator also includes enhanced change management functionality to process all types of change requests.

Available now, Alloy Navigator 5.2 is priced per agent and audit node. Pricing for a three-agent licence supporting 100 nodes is US$3,845 (which includes maintenance).

IDS Scheer and E2E join forces to launch ARIS Bridge solution

IDS Scheer and E2E announced ARIS Bridge. It is designed to “bridge” the traditional gap between processes and applications. Based on the Process-to-Application (P2A) approach, the ARIS Bridge solution allows process oriented integration of existing backend systems by enabling transparent development of reusable enterprise services in form of executable UML models. At the same time, the ARIS Bridge and its Model Driven Integration (MDI) process serves also as a Universal Adapter to accelerate implementation of Process Performance Management (PPM) initiatives.

IDS Scheer also announced bundled solutions comprised of ARIS products and services designed to ensure implementations of Service-Oriented Architectures (SOA), implement Governance, Risk Management, Compliance (GRC) and develop IT architectures through Enterprise Architecture Management (EAM).

ARIS Defense Solution is a Business Process Management (BPM) tool that enables public sector and defense organizations to optimize enterprise architecture management based on the DoDAF (Department of Defense Architecture Framework), NAF (NATO Architecture Framework) and C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance).

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Story

How the CTO can Maintain Cloud Momentum Across the Enterprise

Embracing cloud is easy for some individuals. But embedding widespread cloud adoption at the enterprise level is...

Related Tech News

Get ITBusiness Delivered

Our experienced team of journalists brings you engaging content targeted to IT professionals and line-of-business executives delivered directly to your inbox.

Featured Tech Jobs