NC1801
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
PRODUCTNEWS<br />
SION X<br />
against even the most pernicious volumetric<br />
and zero-day attacks," while her Radware<br />
counterpart, Gary Sevounts said, "Today's<br />
ever-changing threat landscape, necessitates<br />
a layered, defence in-depth approach<br />
to security that scales to global enterprise<br />
networks and combines advanced threat<br />
detection, mitigation, and perimeter protection.<br />
Radware DDoS attack detection and<br />
mitigation service complements Aryaka's<br />
existing security controls and contributes to<br />
a robust security program that meets internationally<br />
accepted security practices."<br />
Boldly claiming a "first-of-its kind solution<br />
to protect critical network, IoT, ICS, and<br />
SCADA devices from privilege-based<br />
attacks," BeyondTrust has announced<br />
PowerBroker for Networks. It's an agentless<br />
solution that controls what commands users<br />
can run, records sessions, alerts, and provides<br />
a complete audit trail of user activity<br />
on network devices via the command line.<br />
Delivered with a modular design that is<br />
highly scalable, its architecture easily scales<br />
to hundreds of thousands of nodes without<br />
overburdening the network or its administrators.<br />
PowerBroker for Networks helps organisations<br />
to manage large, distributed, and<br />
heterogeneous infrastructures while delivering<br />
optimal performance without limiting<br />
activity and integrates with the central<br />
PowerBroker console so that customers can<br />
work with a single policy, management and<br />
reporting interface.<br />
Commenting, Christopher Kissel, Senior<br />
Cybersecurity Analyst at Frost & Sullivan<br />
said, "The idea of identity seems intuitive,<br />
but identity can be distorted either by inside<br />
actors imitating legitimate credential holders,<br />
or miscreants escalating credentials. A<br />
seemingly credentialed actor can wreak<br />
havoc as SecOps teams often cannot discover<br />
nefarious behavior emanating from<br />
users with proper credentials. BeyondTrust<br />
PowerBroker for Networks is an important<br />
and evolutionary step in identity and access<br />
management (IAM), offering network<br />
administrators a single-point of management<br />
for important functions such as command<br />
and control session monitoring and<br />
auditing, the generation of logs for SIEM<br />
and automating single sign-on. Additionally,<br />
PowerBroker for Networks moves identity<br />
from a role-based static event, into an<br />
observable, fluid event, where identitychange<br />
can be an indicator of compromise,<br />
or where SecOps can block access, even<br />
for credentialed actors."<br />
Amulet Hotkey, providers of remote physical<br />
and virtual workstation solutions has<br />
launched a new high-performance IP-based<br />
KVM Extender, claiming that it is "built on<br />
the success of five generations and trusted<br />
in mission critical deployments." The company<br />
explains that "the DX KVM extenders<br />
are an excellent solution to provide secure<br />
remote access to workstations and systems<br />
in deployments such as command and control,<br />
design engineering, as well as media<br />
and entertainment, helping to increase 360-<br />
degree situational awareness, enable secure<br />
collaboration between teams, organisations<br />
and nations, or speed the design, visualisation<br />
and simulation of anything from animation<br />
and movies, to aircraft and cars."<br />
Commenting, Andrew Jackson, president<br />
at Amulet Hotkey says, "Advanced and collaborative<br />
workflows can incorporate any<br />
system including high-resolution images,<br />
complex graphics and video to accelerate<br />
real-time analysis and decisions or boost<br />
creative team productivity."<br />
Most users don't care how their device<br />
connects, but they do care when it doesn't,<br />
and a poor wireless service is far too<br />
often at the heart of the problem. Bringing<br />
new direction to this previously unaddressed<br />
problem, Mist has introduced<br />
what they claim to be "the industry's first<br />
AI-driven Virtual Network Assistant (VNA)."<br />
It uses natural language processing to<br />
interact with Mist's learning WLAN and in<br />
turn simplifying wireless troubleshooting<br />
and offering those that need it, unprecedented<br />
insight.<br />
Explaining its significance, Bob Friday,<br />
CTO and co-founder at Mist said, "VNA is<br />
the next step in our journey towards building<br />
an intelligent AI-driven network that<br />
simplifies operations, lowers operational<br />
expenses and gives unprecedented insight<br />
into the wireless user experience. We started<br />
with a robust distributed micro-servicesbased<br />
software architecture built on a<br />
cloud-based platform that collects and<br />
manages an enormous amount of data.<br />
[Then] we implemented a patented<br />
methodology for organising and classifying<br />
this data into domain specific service levels.<br />
With today's announcement, Mist now<br />
delivers a VNA that can answer questions<br />
on par with a wireless domain expert." NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards JANUARY/FEBRUARY 2018 NETWORKcomputing 9