eEye Digital Security's Blink Professional Unveiled

eEye Digital Security unveils the latest version of Blink Professional, its security technology. Blink Professional is the first to incorporate application whitelisting, removable storage management and dynamic policy support. This added functionality further moves Blink Professional from the Host-based Intrusion Prevention System market segment into a completely new category known as Unified Client Security, in which multiple security functions are consolidated onto a single, centrally managed agent.

Deployed as a software agent on a Windows-based server, desktop PC or laptop, Blink Professional leverages multiple layers of protection more so than any other endpoint security product to shield individual digital assets from attacks and keep systems up and running. Blink Professional not only delivers a comprehensive endpoint security for the attacks that are affecting users today, it also unifies this functionality in order to reduce the memory and computing resources necessary to support the agent. Blink Professional also serves as a platform to which future security functionality can be added, effectively making it the last security agent that IT has to install and manage. Just as importantly, Blink can be deployed and managed from a central location, making it suited for distributed network environments.

In addition to its existing functionality, Blink Professional combines the following new technologies into an integrated solution:
- Dynamic Policy Control This unique capability enables IT to have different policies set up based on the user environment. As users come and go in and out of the network perimeter, their Blink policies can vary with their location. Blink gives IT the ability to block certain behaviors and applications (such as removable hard drives, iTunes, etc.) that may pose a threat while on the network, but still allow users to access while on the road, whether that be a hotel, a coffee shop, home, etc. No other Unified Client Security product has this capability.
- Policy-Based Hardware Access Blink can detect, allow or deny access to USB storage devices that map drives to systems. Examples of the devices include iPods, USB keys, USB external hard drives, etc. Blink allows IT to block or allow all of these devices. By preventing the use of USB storage devices organizations can stop users from downloading important company information, installing unapproved applications or applications that may have malicious software.
- Execution Control Blink can be configured to allow or deny the execution of processes and control which applications are used on each system. For example, users may receive e-mails that contain video or sound files from their friends and colleagues, which may contain harmful malicious programs. If these are installed and launched, a user's system is now compromised. However, if IT adds rules to the Execution Control feature to limit which processes are authorized to launch, then unauthorized applications are prevented from executing.

Blink Professional also still integrates the functionality that makes it the first Unified Client Security product. These include:
- Protocol-based IPS Blink's unique approach to IPS stops both known and unknown attacks from ever reaching the operating system by focusing on the methods of exploitation that such attacks utilize. This enables Blink to stop intrusions without having to identify the unique signature of the attack itself, while stopping the attack before it infects the system. Unlike behavior-based endpoint security solutions, Blink does not need to "learn" proper behavior, but stops all attacks "right out of the box."
- Application Protection prevents buffer overflow attacks from passing control of a system to an external agent or crashing a system in a denial of service attack
- System Firewall protects inbound and outbound port access
- Application Firewall determines which protocols can talk to specific applications
- Anti-Malware/Anti-Spyware Protection and Removal Blink provides real-time malicious code protection that actively blocks malware, spyware and keystroke/password loggers from being loaded into memory. It also provides the option to quarantine or remove the suspect code. As a secondary layer of defense, Blink will also perform intelligent disk scanning to identify and remove malware from the system.
- Anti-Phishing Protection warns of fraudulent links and URLs
- Retina Local Agent for VA for periodic assessment of all local system vulnerabilities and how to remediate them
- Policy Integration and Compliance integration with the award-winning REM Security Management Console for agent deployment, gathering and evaluating enterprise-wide attack data and managing the distribution and enforcement of security policies.

write your comments about the article :: 2006 Computing News :: home page