Arxceo Turns Table at Conference

Arxceo's anti-reconnaissance security appliance turns the table on cyber specialists at engineering conference

Dark Reading Staff, Dark Reading

April 10, 2007

2 Min Read
Dark Reading logo in a gray background | Dark Reading

HUNTSVILLE, Ala. -- Arxceo® Corporation, a provider of anti-reconnaissance and anomaly behavioral-based attack prevention technology, demonstrated its Ally ip100(TM) security appliance during the Digital Combat Exercise (DCE) held at the 2007 Southeastern Software & Systems Engineering Conference (SE)3 on March 12-15 in Huntsville, Alabama. The Ally ip100 performed flawlessly by camouflaging the network and frustrating attackers with anti-reconnaissance false positives. Unlike the false positives that network administrators are usually faced with, these false positives confuse, deter and mislead the attacker and cause them to loose valuable time.

Among the experts analyzing Arxceo's defense were researchers from the Georgia Tech Research Institute, which fielded an "attack team” that participated in the digital exercise designed to engage cyber specialists in launching digital attacks on networks with varying levels of security. The Georgia Tech Research Institute team said Arxceo's Ally ip100 is likely to be very effective in deterring hackers from attacking a network or server.

Arxceo's Ally ip100(TM) is an easy-to-install, low-cost, low-maintenance solution designed for small businesses, branch offices and departments hoping to avoid zero-day attacks, Denial of Service (DOS) attacks, or to keep safe from hackers and corporate espionage breaches. The Ally ip100 creates an offensive, always-on defense that prevents attackers from using even a single packet to probe the network for vulnerabilities. Arxceo's Ally ip100 defense was the least expensive security device integrated into the Digital Combat Exercise.

"We were asked to make this easier than the last Digital Combat Exercise, as all the teams were frustrated and unable to get any information about devices behind our appliance. This year, we provided the IP address of the unprotected Webserver and told them there were at least two default services running on their standard ports with easy-to-guess passwords,” said Don Davidson, CEO, Arxceo. "In order to simplify the process even further and make it a learning experience, we provided the teams with our literature and towards the end of the lengthy exercise; we turned off our blacklisting feature.”

Arxceo Corp.

Read more about:

2007

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights