20.02.2018 Views

NC1801

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PRODUCTNEWS<br />

SION X<br />

against even the most pernicious volumetric<br />

and zero-day attacks," while her Radware<br />

counterpart, Gary Sevounts said, "Today's<br />

ever-changing threat landscape, necessitates<br />

a layered, defence in-depth approach<br />

to security that scales to global enterprise<br />

networks and combines advanced threat<br />

detection, mitigation, and perimeter protection.<br />

Radware DDoS attack detection and<br />

mitigation service complements Aryaka's<br />

existing security controls and contributes to<br />

a robust security program that meets internationally<br />

accepted security practices."<br />

Boldly claiming a "first-of-its kind solution<br />

to protect critical network, IoT, ICS, and<br />

SCADA devices from privilege-based<br />

attacks," BeyondTrust has announced<br />

PowerBroker for Networks. It's an agentless<br />

solution that controls what commands users<br />

can run, records sessions, alerts, and provides<br />

a complete audit trail of user activity<br />

on network devices via the command line.<br />

Delivered with a modular design that is<br />

highly scalable, its architecture easily scales<br />

to hundreds of thousands of nodes without<br />

overburdening the network or its administrators.<br />

PowerBroker for Networks helps organisations<br />

to manage large, distributed, and<br />

heterogeneous infrastructures while delivering<br />

optimal performance without limiting<br />

activity and integrates with the central<br />

PowerBroker console so that customers can<br />

work with a single policy, management and<br />

reporting interface.<br />

Commenting, Christopher Kissel, Senior<br />

Cybersecurity Analyst at Frost & Sullivan<br />

said, "The idea of identity seems intuitive,<br />

but identity can be distorted either by inside<br />

actors imitating legitimate credential holders,<br />

or miscreants escalating credentials. A<br />

seemingly credentialed actor can wreak<br />

havoc as SecOps teams often cannot discover<br />

nefarious behavior emanating from<br />

users with proper credentials. BeyondTrust<br />

PowerBroker for Networks is an important<br />

and evolutionary step in identity and access<br />

management (IAM), offering network<br />

administrators a single-point of management<br />

for important functions such as command<br />

and control session monitoring and<br />

auditing, the generation of logs for SIEM<br />

and automating single sign-on. Additionally,<br />

PowerBroker for Networks moves identity<br />

from a role-based static event, into an<br />

observable, fluid event, where identitychange<br />

can be an indicator of compromise,<br />

or where SecOps can block access, even<br />

for credentialed actors."<br />

Amulet Hotkey, providers of remote physical<br />

and virtual workstation solutions has<br />

launched a new high-performance IP-based<br />

KVM Extender, claiming that it is "built on<br />

the success of five generations and trusted<br />

in mission critical deployments." The company<br />

explains that "the DX KVM extenders<br />

are an excellent solution to provide secure<br />

remote access to workstations and systems<br />

in deployments such as command and control,<br />

design engineering, as well as media<br />

and entertainment, helping to increase 360-<br />

degree situational awareness, enable secure<br />

collaboration between teams, organisations<br />

and nations, or speed the design, visualisation<br />

and simulation of anything from animation<br />

and movies, to aircraft and cars."<br />

Commenting, Andrew Jackson, president<br />

at Amulet Hotkey says, "Advanced and collaborative<br />

workflows can incorporate any<br />

system including high-resolution images,<br />

complex graphics and video to accelerate<br />

real-time analysis and decisions or boost<br />

creative team productivity."<br />

Most users don't care how their device<br />

connects, but they do care when it doesn't,<br />

and a poor wireless service is far too<br />

often at the heart of the problem. Bringing<br />

new direction to this previously unaddressed<br />

problem, Mist has introduced<br />

what they claim to be "the industry's first<br />

AI-driven Virtual Network Assistant (VNA)."<br />

It uses natural language processing to<br />

interact with Mist's learning WLAN and in<br />

turn simplifying wireless troubleshooting<br />

and offering those that need it, unprecedented<br />

insight.<br />

Explaining its significance, Bob Friday,<br />

CTO and co-founder at Mist said, "VNA is<br />

the next step in our journey towards building<br />

an intelligent AI-driven network that<br />

simplifies operations, lowers operational<br />

expenses and gives unprecedented insight<br />

into the wireless user experience. We started<br />

with a robust distributed micro-servicesbased<br />

software architecture built on a<br />

cloud-based platform that collects and<br />

manages an enormous amount of data.<br />

[Then] we implemented a patented<br />

methodology for organising and classifying<br />

this data into domain specific service levels.<br />

With today's announcement, Mist now<br />

delivers a VNA that can answer questions<br />

on par with a wireless domain expert." NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards JANUARY/FEBRUARY 2018 NETWORKcomputing 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!