Network Intrusion Detection, Neighborhood Watch Style - page 2
Sophisticated New Methods
Global DataGuard CEO Scott Paly sees new opportunities for his company's unique approach to intrusion detection.
Taking advantage of the technology is currently only available as a contracted service through Global DataGuard.
Pretty soon, Paly said that GDG will begin selling the client software and authentication needed, so an ASP can open up their own monitoring service. Clients will also be able to purchase versions that allow their own security and operations staff to monitor network behavior and alerts. Using a web based interface has greatly facilitated those markets.
By Q2-2005, Paly anticipates that customers will be setting up their own analysis engines, including clusters to do all their own in-house monitoring.
"We wanted to make it as flexible as possible," Paly said. He also emphasized that the company is "not selling anything we don't use daily."
Other future directions for the 20 person company include distilling multiple data sources to a behavioral based integrated security management dashboard and offering an on-demand feature. The on-demand feature is interesting in that it will allow GDG or ASPs to take over monitoring duties for temporary periods when a company's in-house monitoring staff may not be available.
Paly also wants to be able to add in other vendor data, analyzing it through the behavioral engine software and enhance the overall threat picture even further.
When asked about their participation in the Open Source Software world, Stute said that they've enhanced some of the standard network diagnostic tools like tcpdump, cpan and whois, and have routed their suggestions back into the community.
Stute couldn't say if they would ever offer a publicly released version of their analysis software, because the technology is patent pending and proprietary.
Global DataGuard offers a comprehensive threat detection and alerting package that works in ways that other systems are not able to do. Using a sophisticated combination of behavioral analysis software and multi-machine processing to help you "connect the dots," it can help keep the criminals and terrorists out of your cyber neighborhood.
Rob Reilly is a consultant, who advises clients in the area of business and technical communication. He regularly writes Linux, presentation technology and portable computing related articles that appear in various high-end Linux and business media outlets. Visit his web site at http://home.earthlink.net/~robreilly.