Network Intrusion Detection, Neighborhood Watch Style - page 2
Sophisticated New Methods
Global DataGuard CEO Scott Paly sees new opportunities for his company's unique approach to intrusion detection.
Taking advantage of the technology is currently only available as a contracted service through Global DataGuard.
Pretty soon, Paly said that GDG will begin selling the client software and authentication needed, so an ASP can open up their own monitoring service. Clients will also be able to purchase versions that allow their own security and operations staff to monitor network behavior and alerts. Using a web based interface has greatly facilitated those markets.
By Q2-2005, Paly anticipates that customers will be setting up their own analysis engines, including clusters to do all their own in-house monitoring.
"We wanted to make it as flexible as possible," Paly said. He also emphasized that the company is "not selling anything we don't use daily."
Other future directions for the 20 person company include distilling multiple data sources to a behavioral based integrated security management dashboard and offering an on-demand feature. The on-demand feature is interesting in that it will allow GDG or ASPs to take over monitoring duties for temporary periods when a company's in-house monitoring staff may not be available.
Paly also wants to be able to add in other vendor data, analyzing it through the behavioral engine software and enhance the overall threat picture even further.
When asked about their participation in the Open Source Software world, Stute said that they've enhanced some of the standard network diagnostic tools like tcpdump, cpan and whois, and have routed their suggestions back into the community.
Stute couldn't say if they would ever offer a publicly released version of their analysis software, because the technology is patent pending and proprietary.
Global DataGuard offers a comprehensive threat detection and alerting package that works in ways that other systems are not able to do. Using a sophisticated combination of behavioral analysis software and multi-machine processing to help you "connect the dots," it can help keep the criminals and terrorists out of your cyber neighborhood.
Rob Reilly is a consultant, who advises clients in the area of business and technical communication. He regularly writes Linux, presentation technology and portable computing related articles that appear in various high-end Linux and business media outlets. Visit his web site at http://home.earthlink.net/~robreilly.
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.
- 1Linux Top 3: GNOME 3.12 and New Betas for Ubuntu 14.04 and OpenMandriva Lx 2014.0
- 2Linux Top 3: Linux 3.10 Goes Long, Linux 3.11 Advances as LXDE Merges
- 3Linux Top 3: Linus Lashes out, Linux 3.14 Gets PIE and Ubuntu One is Done.
- 4Linux Top 3: Ubuntu 14.04, Debian Gives Squeeze More Life and Red Hat Goes Atomic
- 5Linux Top 3: Linux 3.11, Kubuntu Goes Commercial