Top Layer Rolls Out New IPS
Top Layer Networks announced immediate availability of the latest version of its flagship IPS 5500 intrusion prevention solution
WESTBOROUGH, Mass. -- Top Layer Networks, a global leader for high performance intrusion prevention solutions, today announced immediate availability of the latest version of its flagship IPS 5500 intrusion prevention solution – the E-Series. In addition, Top Layer’s’ new IPS Controller management software provides real-time “Command and Control” functionality to configure and manage multiple IPS 5500 units throughout the network.
The continued discovery of vulnerabilities in commercially-deployed software puts servers and client workstations at risk for becoming compromised by Spyware, viruses, “botnet” programs and other malicious code. In 2006 and 2007, the prevalence of vulnerabilities in file-handling software, such as various components of Microsoft operating platforms, is increasing. Top Layer has created and added “TopInspect” File Validation to its new E-Series IPS solution to address this important trend in the evolving threat landscape.
The IPS 5500 E-Series uses TopInspect Deep Packet Inspection to analyze network traffic as two distinct parts: Protocol Validation Modules (PVM’s) inspect the network protocols that are used to initiate communication and carry payload data from one computer to another; Data Validation Modules (DVM’s) inspect the actual files that are carried as payloads by the network protocols.
Unlike most IPS solutions that use regular expressions or compound signatures to inspect network traffic, the IPS 5500 E-Series uses file-format-awareness to identify the type of payload being carried, and then uses a Data Validation Module that was specifically created for that file format to complete the inspection. This leads to fewer “signature” updates, better coverage of multi-vector vulnerabilities, and fewer false positive indications.
“Compromised computers are the vehicle by which a significant portion of 2007 cyber attacks are delivered,” said Peter Rendall, president and CEO of Top Layer Networks. “It is crucial that enterprise organizations protect their computing infrastructure from the threats which can lead to compromised systems, including remote exploits, Spyware, P2P applications and other malware.”
Read more about:
2007About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024