Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Radware Positioned in the Visionaries Quadrant of the Magic Quadrant for Intrusion Prevention System Appliances

April 2009 by Marc Jacob

Radware announced it has been positioned by Gartner, Inc. in the Visionaries quadrant of the Magic Quadrant for Network Intrusion Prevention System Appliances.

Radware’s DefensePro™ is a real-time Intrusion Prevention System (IPS) that maintains business continuity by protecting IP infrastructures against existing and emerging network-based threats that cannot be detected by traditional IPS’ such as: application misuse threats, SSL attacks and VoIP service misuse. DefensePro features full protection against vulnerability-based threats through proactive signature updates, which safeguard against already known attacks including worms, Trojans, Bots, SSL-based attacks and VoIP threats.

DefensePro delivers behavioral-based technology that automatically, generates real-time signatures. This prevents non-vulnerability-based threats and zero-minute attacks such as application misuse attacks, server brute force attacks, application and network flooding - without blocking legitimate user traffic and no need for human intervention. The product line is based on a pay-as-you-grow license upgrade approach and ease of management through ‘hands-off’ security features such as no-configuration and self-tuning.

According to the Magic Quadrant for Network Intrusion Prevention System Appliances, “The network IPS market subsumed the intrusion detection system (IDS) market several years ago and contains all of the detection features of IDS with two critical areas of improvement: Intrusion prevention moves beyond simple attack signature detection to add vulnerability-based signature and non-signature detection capabilities; and network IPS sensors operate at wire speeds to enable inline automated blocking and attack handling.”

The research report further cites that, “the challenge in combating arbitrary malware is in better handling the “gray list,” or suspicious traffic that is neither known good (white list) nor known bad (black list).”




See previous articles

    

See next articles