Top Layer Rolls Out New IPS

Top Layer Networks announced immediate availability of the latest version of its flagship IPS 5500 intrusion prevention solution

Dark Reading Staff, Dark Reading

April 12, 2007

2 Min Read
Dark Reading logo in a gray background | Dark Reading

WESTBOROUGH, Mass. -- Top Layer Networks, a global leader for high performance intrusion prevention solutions, today announced immediate availability of the latest version of its flagship IPS 5500 intrusion prevention solution – the E-Series. In addition, Top Layer’s’ new IPS Controller management software provides real-time “Command and Control” functionality to configure and manage multiple IPS 5500 units throughout the network.

The continued discovery of vulnerabilities in commercially-deployed software puts servers and client workstations at risk for becoming compromised by Spyware, viruses, “botnet” programs and other malicious code. In 2006 and 2007, the prevalence of vulnerabilities in file-handling software, such as various components of Microsoft operating platforms, is increasing. Top Layer has created and added “TopInspect” File Validation to its new E-Series IPS solution to address this important trend in the evolving threat landscape.

The IPS 5500 E-Series uses TopInspect Deep Packet Inspection to analyze network traffic as two distinct parts: Protocol Validation Modules (PVM’s) inspect the network protocols that are used to initiate communication and carry payload data from one computer to another; Data Validation Modules (DVM’s) inspect the actual files that are carried as payloads by the network protocols.

Unlike most IPS solutions that use regular expressions or compound signatures to inspect network traffic, the IPS 5500 E-Series uses file-format-awareness to identify the type of payload being carried, and then uses a Data Validation Module that was specifically created for that file format to complete the inspection. This leads to fewer “signature” updates, better coverage of multi-vector vulnerabilities, and fewer false positive indications.

“Compromised computers are the vehicle by which a significant portion of 2007 cyber attacks are delivered,” said Peter Rendall, president and CEO of Top Layer Networks. “It is crucial that enterprise organizations protect their computing infrastructure from the threats which can lead to compromised systems, including remote exploits, Spyware, P2P applications and other malware.”

Top Layer Networks

Read more about:

2007

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights