Sourcefire Announces Snort 2.0
Sourcefire recently announced Snort 2.0, which, according to the
company, provides users with increased accuracy and up to 12 times
greater performance than previous versions. Snort 2.0 has been reengineered
to use a new HTTP protocol flow analyzer and detection engine. The
flow analyzer optimizes data flow by reducing unnecessary data inspections,
while the detection engine uses a set-based rule selection methodology
and a high-performance multi-pattern search engine.
The multi-pattern search engine uses a two-stage architecture
to inspect data and find rule matches. The first stage of the multi-pattern
search engine is a high-speed set-based inspection engine, which
quickly identifies potential rule matches based on content and ports.
The second stage is an enhanced rule-processing engine, which provides
additional functionality for validation of potential rule matches.
Together, these enhancements can improve the performance and efficiency
of Snort and help to reduce false alarms.
For more information, visit: http://www.sourcefire.com/.
Westinghouse Releases StatePointPlus
Westinghouse Electric Company recently announced StatePointPlus
Systems Integrity Controller. According to the company, StatePointPlus
controls systems integrity from inside each computer by diagnosing
and enforcing distributed and disparate computer configuration baselines
for Windows 2000, NT, and Solaris environments. The software also
enables administrators to implement and remove software on remote
computers from a central location. Additionally, the Product Inventory
feature replaces manual inventory methods, providing users with
a reliable way of automatically tracking their systems software.
A one-screen view allows users to monitor the status of all computers
under StatePointPlus control in real-time.
For more information, visit: http://www.statepointplus.com/.
Raidtec Announces FlexArray 12 and FlexArray 6
Raidtec Corporation announced two Ultra 320 SCSI Storage JBOD
models in its enclosure design, the FlexArray 12 and FlexArray 6.
According to the company, the new FlexArray models can accommodate
up to 2.1TB in a 12 bay, and 1.2 TB in a 6 bay when populated with
180-MB capacity disk drives. The FlexArray 12 bay is available in
both a rackmount and tower configuration, and has more than 500-GB
per 1U of rack space.
FlexArray 6 is available as a mini-tower enclosure only. FlexArray
12 and FlexArray 6 offer a choice of cost effective storage enclosure
solutions for heavy duty, continuous applications that require high
data availability and system reliability. All enclosures in the
new line accommodate current SCSI drives, including the new 72MB,
15K rpm models, and feature maximum wattage power supplies and drive
cooling systems. FlexArray 12 and FlexArray 6 support major third
party host adapters and PCI slot-based RAID controllers suitable
for most applications, platforms, and operating systems. Additionally,
specific FlexArray enclosures have hot swap drive shuttles, fans,
and power supplies. Enclosure monitoring is by serial connection
and standard terminal emulator.
For more information, visit: http://www.raidtec.com.
Cylant Releases CylantSecure 2.0
Cylant announced the release of version 2.0 of CylantSecure. According
to the company, CylantSecure utilizes kernel monitoring to detect
attacks without continual signature or rule-set updates. Features
include kernel-level attack detection, customizable countermeasures,
support for multiple operating systems, real-time detection and
response, and self-training behavioral control and mandatory access
Free demo versions of CylantSecure are available at: http://www.cylant.com.
Celestix Introduces FV930
Celestix Networks, Inc. announced the release of the FV930, the
companys first rack mount appliance. According to the company,
the FV930 integrates Check Point Software Technologies Ltd. VPN-1/FireWall-1/Next
Generation, an Internet security solution, to deliver security and
connectivity to mid-size enterprises and regional offices.
The FV930 features a backlit LCD panel (40 x 2 character) with
an integrated dial control that can allow admins to configure network
parameters and quickly begin securing the network. The LCD also
provides critical information and allows users to install security
updates, or change the configuration of the appliance. FV930 can
be managed locally via a standard Web browser or centrally through
Check Points management software.
The FV930 starts at $3,995. For more information, visit: http://www.celestix.com.
Emic Networks Announces Emic Application Cluster
Emic Networks recently announced Emic Application Cluster (EAC).
According to the company, EAC is a new application-clustering product
that is tuned for MySQL. By forming virtual database entities, which
can be either local or distributed, EAC eliminates the need for
a shared storage device and provides failover protection while preserving
all transaction ACID requirements. EAC uses clustering technology
with a group communication replication technology, which provides
the consistency of synchronous replication at the speed of asynchronous
replication, with no decrease of overall performance.
For more information, visit: http://www.emicnetworks.com.
FalconStor Unveils IPStor Version 3.5
FalconStor Software, Inc. introduced IPStor version 3.5. According
to the company, version 3.5 contains new features that offer businesses
expanded connectivity, advanced replication services, SSD-based
I/O Accelerator, and HyperTrac Backup Accelerator to double the
speed of third party backup/recovery solutions.
For more information, visit: http://www.falconstor.com.
AdminForce Releases AdminForce Powerwall 3NSS
AdminForce recently released AdminForce Powerwall 3 Network Security
System, which, according to the company, provides network security
protection for moderate- and small-sized business. AdminForce Powerwall
3NSS includes a remote installation element, remote monitoring,
weekly activity reports, and an Intrusion Detection System with
alarm and early warning features. Its purchase price also includes
an automatic monitoring and upgrade package.
For more information, visit: http://www.AdminForce.net.
Ekahau Announces Ekahau Positioning Engine 2.0
Ekahau, Inc. recently announced Ekahau Positioning Engine (EPE)
2.0 for 802.11 wireless local area networks. According to the company,
the new EPE 2.0 provides positioning accuracy of 3.5 ft in pinpointing
the location of wireless PDAs, laptops, and other 802.11-enabled
devices. The 2.0 version includes a new patent-pending Rail Tracking
feature, eliminating through-the-wall errors and enabling indoor
navigation and guidance. Multi-floor tracking provides real-time
tracking in high-rise buildings, and the boosted performance provides
continuous tracking up to hundreds of locations per second.
For more information, visit: http://www.ekahau.com/.
Jasomi Networks Unveils PeerPoint Centrex Edition
Jasomi Networks recently announced its PeerPoint Centrex Edition
technology for SIP (Session Initiation Protocol), which, according
to the company, lets providers serve VoIP over the Internet to customers
located behind NAT-enabled firewalls without requiring customer
premise equipment or software. Jasomis solution can enable
SIP-based voice services across the Internet to residential, SOHO,
and small-to-medium enterprise customers, removing the need to deploy
any equipment on the customer site other than ordinary IP phones
or soft-phones. Enterprise and call-center customers can use the
same technology to support home and roving users
For more information, visit: http://www.jasomi.com/.
Rainfinity Announces RainStorage
Rainfinity recently announced RainStorage, a plug-and-play appliance
that offers uninterrupted data access while moving data between
network attached storage (NAS) devices. According to the company,
the RainStorage appliance works transparently to eliminate data
access disruptions and time-consuming coordination efforts traditionally
associated with routine NAS data migration tasks, yet can be installed
and running in about an hour without data integrity or access risk.
The RainStorage appliance can enable NAS administrators to perform
data migration, volume expansion, capacity management, load balancing,
file server consolidation, and other storage management duties quickly
and easily while ensuring the highest level of data integrity and
reliability. Clients can continue to mount directly to NAS devices
throughout data moves, and clients and servers have non-stop data
access with no disaster recovery, data access, or data integrity
exposure. RainStorage plugs into the existing network switch, and
integrates without changes to storage devices, servers, clients
or storage management tools and utilities.
For more information, contact: http://www.rainfinity.com.
GMx Solutions Releases CM_SAFE Configuration File Management
GMx Solutions, Inc. announced the release of CM_SAFE, version
1.6. According to the company, CM_SAVE provides configuration file
management capabilities for Open Systems servers and stores server
configuration files in a centralized repository. In the event of
a configuration error, CM_SAFE can restore a known-working configuration
with a single command. It can also use current base-lined configuration
files to build configurations for new servers or to replicate current
functionality on existing servers. It supports configuration disaster
recovery for hot sites and cold sites, and can be used to monitor
vulnerable files for changes that could indicate security exposures.
CM_SAFE is designed to support all major Open Systems enterprises
and can be used to facilitate configuration recovery or duplication
on dissimilar platforms. CM_SAFE reduces the time and resources
required to manage server configuration, as well as reducing the
risk and length of configuration-related outages.
For more information, visit: http://www.gmxsolutions.com.
Lund Performance Solutions Enhances Shadow DR
Lund Performance Solutions recently announced enhancements to
its Shadow D/R data replication product, which replicates TurboImage
databases in real time. According to the company, the main enhancement
is that Shadow D/R can now replicate KSAM files and flat files as
well as TurboImage databases. Almost all file types and access modes
are supported. POSIX files and byte stream files are replicated,
as are mapped files.
An additional enhancement is that Shadow D/R can rename files
and databases when replicating them from the primary to the secondary
system. Files can now be replicated from a primary system back to
itself, giving the target files new names. Since the target files
can be on a different volume set than the source files, this capability
provides data integrity and disk load balancing, according to the
For more information, visit: http://www.lund.com.