Cover V11, I12



New Products

Sourcefire Announces Snort 2.0

Sourcefire recently announced Snort 2.0, which, according to the company, provides users with increased accuracy and up to 12 times greater performance than previous versions. Snort 2.0 has been reengineered to use a new HTTP protocol flow analyzer and detection engine. The flow analyzer optimizes data flow by reducing unnecessary data inspections, while the detection engine uses a set-based rule selection methodology and a high-performance multi-pattern search engine.

The multi-pattern search engine uses a two-stage architecture to inspect data and find rule matches. The first stage of the multi-pattern search engine is a high-speed set-based inspection engine, which quickly identifies potential rule matches based on content and ports. The second stage is an enhanced rule-processing engine, which provides additional functionality for validation of potential rule matches. Together, these enhancements can improve the performance and efficiency of Snort and help to reduce false alarms.

For more information, visit:

Westinghouse Releases StatePointPlus

Westinghouse Electric Company recently announced StatePointPlus Systems Integrity Controller. According to the company, StatePointPlus controls systems integrity from inside each computer by diagnosing and enforcing distributed and disparate computer configuration baselines for Windows 2000, NT, and Solaris environments. The software also enables administrators to implement and remove software on remote computers from a central location. Additionally, the Product Inventory feature replaces manual inventory methods, providing users with a reliable way of automatically tracking their systems’ software. A one-screen view allows users to monitor the status of all computers under StatePointPlus control in real-time.

For more information, visit:

Raidtec Announces FlexArray 12 and FlexArray 6

Raidtec Corporation announced two Ultra 320 SCSI Storage JBOD models in its enclosure design, the FlexArray 12 and FlexArray 6. According to the company, the new FlexArray models can accommodate up to 2.1TB in a 12 bay, and 1.2 TB in a 6 bay when populated with 180-MB capacity disk drives. The FlexArray 12 bay is available in both a rackmount and tower configuration, and has more than 500-GB per 1U of rack space.

FlexArray 6 is available as a mini-tower enclosure only. FlexArray 12 and FlexArray 6 offer a choice of cost effective storage enclosure solutions for heavy duty, continuous applications that require high data availability and system reliability. All enclosures in the new line accommodate current SCSI drives, including the new 72MB, 15K rpm models, and feature maximum wattage power supplies and drive cooling systems. FlexArray 12 and FlexArray 6 support major third party host adapters and PCI slot-based RAID controllers suitable for most applications, platforms, and operating systems. Additionally, specific FlexArray enclosures have hot swap drive shuttles, fans, and power supplies. Enclosure monitoring is by serial connection and standard terminal emulator.

For more information, visit:

Cylant Releases CylantSecure 2.0

Cylant announced the release of version 2.0 of CylantSecure. According to the company, CylantSecure utilizes kernel monitoring to detect attacks without continual signature or rule-set updates. Features include kernel-level attack detection, customizable countermeasures, support for multiple operating systems, real-time detection and response, and self-training behavioral control and mandatory access control.

Free demo versions of CylantSecure are available at:

Celestix Introduces FV930

Celestix Networks, Inc. announced the release of the FV930, the company’s first rack mount appliance. According to the company, the FV930 integrates Check Point Software Technologies Ltd. VPN-1/FireWall-1/Next Generation, an Internet security solution, to deliver security and connectivity to mid-size enterprises and regional offices.

The FV930 features a backlit LCD panel (40 x 2 character) with an integrated dial control that can allow admins to configure network parameters and quickly begin securing the network. The LCD also provides critical information and allows users to install security updates, or change the configuration of the appliance. FV930 can be managed locally via a standard Web browser or centrally through Check Point’s management software.

The FV930 starts at $3,995. For more information, visit:

Emic Networks Announces Emic Application Cluster

Emic Networks recently announced Emic Application Cluster (EAC). According to the company, EAC is a new application-clustering product that is tuned for MySQL. By forming virtual database entities, which can be either local or distributed, EAC eliminates the need for a shared storage device and provides failover protection while preserving all transaction ACID requirements. EAC uses clustering technology with a group communication replication technology, which provides the consistency of synchronous replication at the speed of asynchronous replication, with no decrease of overall performance.

For more information, visit:

FalconStor Unveils IPStor Version 3.5

FalconStor Software, Inc. introduced IPStor version 3.5. According to the company, version 3.5 contains new features that offer businesses expanded connectivity, advanced replication services, SSD-based I/O Accelerator, and HyperTrac Backup Accelerator to double the speed of third party backup/recovery solutions.

For more information, visit:

AdminForce Releases AdminForce Powerwall 3NSS

AdminForce recently released AdminForce Powerwall 3 Network Security System, which, according to the company, provides network security protection for moderate- and small-sized business. AdminForce Powerwall 3NSS includes a remote installation element, remote monitoring, weekly activity reports, and an Intrusion Detection System with alarm and early warning features. Its purchase price also includes an automatic monitoring and upgrade package.

For more information, visit:

Ekahau Announces Ekahau Positioning Engine 2.0

Ekahau, Inc. recently announced Ekahau Positioning Engine (EPE) 2.0 for 802.11 wireless local area networks. According to the company, the new EPE 2.0 provides positioning accuracy of 3.5 ft in pinpointing the location of wireless PDAs, laptops, and other 802.11-enabled devices. The 2.0 version includes a new patent-pending Rail Tracking feature, eliminating through-the-wall errors and enabling indoor navigation and guidance. Multi-floor tracking provides real-time tracking in high-rise buildings, and the boosted performance provides continuous tracking up to hundreds of locations per second.

For more information, visit:

Jasomi Networks Unveils PeerPoint Centrex Edition

Jasomi Networks recently announced its PeerPoint Centrex Edition technology for SIP (Session Initiation Protocol), which, according to the company, lets providers serve VoIP over the Internet to customers located behind NAT-enabled firewalls without requiring customer premise equipment or software. Jasomi’s solution can enable SIP-based voice services across the Internet to residential, SOHO, and small-to-medium enterprise customers, removing the need to deploy any equipment on the customer site other than ordinary IP phones or soft-phones. Enterprise and call-center customers can use the same technology to support home and roving users

For more information, visit:

Rainfinity Announces RainStorage

Rainfinity recently announced RainStorage, a plug-and-play appliance that offers uninterrupted data access while moving data between network attached storage (NAS) devices. According to the company, the RainStorage appliance works transparently to eliminate data access disruptions and time-consuming coordination efforts traditionally associated with routine NAS data migration tasks, yet can be installed and running in about an hour without data integrity or access risk.

The RainStorage appliance can enable NAS administrators to perform data migration, volume expansion, capacity management, load balancing, file server consolidation, and other storage management duties quickly and easily while ensuring the highest level of data integrity and reliability. Clients can continue to mount directly to NAS devices throughout data moves, and clients and servers have non-stop data access with no disaster recovery, data access, or data integrity exposure. RainStorage plugs into the existing network switch, and integrates without changes to storage devices, servers, clients or storage management tools and utilities.

For more information, contact:

GMx Solutions Releases CM_SAFE Configuration File Management Appliance

GMx Solutions, Inc. announced the release of CM_SAFE, version 1.6. According to the company, CM_SAVE provides configuration file management capabilities for Open Systems servers and stores server configuration files in a centralized repository. In the event of a configuration error, CM_SAFE can restore a known-working configuration with a single command. It can also use current base-lined configuration files to build configurations for new servers or to replicate current functionality on existing servers. It supports configuration disaster recovery for hot sites and cold sites, and can be used to monitor vulnerable files for changes that could indicate security exposures.

CM_SAFE is designed to support all major Open Systems enterprises and can be used to facilitate configuration recovery or duplication on dissimilar platforms. CM_SAFE reduces the time and resources required to manage server configuration, as well as reducing the risk and length of configuration-related outages.

For more information, visit:

Lund Performance Solutions Enhances Shadow DR

Lund Performance Solutions recently announced enhancements to its Shadow D/R data replication product, which replicates TurboImage databases in real time. According to the company, the main enhancement is that Shadow D/R can now replicate KSAM files and flat files as well as TurboImage databases. Almost all file types and access modes are supported. POSIX files and byte stream files are replicated, as are mapped files.

An additional enhancement is that Shadow D/R can rename files and databases when replicating them from the primary to the secondary system. Files can now be replicated from a primary system back to itself, giving the target files new names. Since the target files can be on a different volume set than the source files, this capability provides data integrity and disk load balancing, according to the company.

For more information, visit: