contents

products
 
Secure Computing's Zero-Hour Attack Protection Technology

Secure Computing Corporation has announced the Sidewinder G2 Security Appliance's patented Type Enforcement technology protects customers from hacker attempts to exploit the recent Sendmail vulnerability. The vulnerability was reported by the Computer Emergency Response Team (CERT) in CERT advisory CVE-2006-0058. The Sendmail vulnerability may permit an attacker to completely take over Sendmail message transfer agent (MTA) servers, left unprotected or protected by weaker firewalls, on the Internet or on corporate and government networks; subsequently, e-mail privacy and availability are compromised. The vulnerability also allows the attacker to possibly take control of other devices on the network. Secure's zero-hour attack protection stops attackers' attempts to exploit this vulnerability by taking the impact of an attack on Sidewinder G2, at the perimeter, containing the attack, automatically terminating the hacker's connection and continuing to securely pass e-mail through the system.

Sendmail is the cornerstone e-mail delivery application on the Internet used for moving billions of e-mail messages daily. More than half of the large ISPs and Fortune 500 use Sendmail, as well as governments around the world.

Sidewinder G2 ZAP technology is based upon the positive security model, which allows only legitimate network traffic and denies everything else. "Negative model" security technologies like IPS gateways are extremely useful, but they allow everything through the gateway unless they recognize known viruses and attacks. The positive security model is therefore superior at preventing unknown attacks because it automatically eliminates exposure to many types of attacks - unknown as well as known. ZAP technology combines over 200.000 attack signatures with a positive security model for maximum protection.

Secure Computing's ZAP technology also includes all key defense-in-depth security techniques working simultaneously in the Sidewinder G2, including:
- SecureOS self-defending platforms with patented Type Enforcement technology - a preeminent example of the positive security model.
- Secure Application Pathways that come pre-built with the system and are then tightly configured by the customer to protect their Internet facing applications - another preeminent example of the positive security model.
- Event monitoring, analysis, and notification using the Sidewinder G2 dashboard and Sidewinder G2 Security Reporter.
- Traditional signature-based attack protections, including over 200.000 threat signatures.



write your comments about the article :: © 2006 Networking News :: home page