Aventail secures VPNs down to the client

Aventail secures VPNs down to the client

Abstracts of Recent Articles and Literature malformed IP packets that cause large amounts of data to be copied into memory, resulting in server or ne...

126KB Sizes 6 Downloads 85 Views

Abstracts of Recent Articles and Literature

malformed IP packets that cause large amounts of data to be copied into memory, resulting in server or network device crashes. NetRanger sends an alert with details of the two attacks to a central management system. LANTimes, December 8, 1997, p. 18. Ironing out SET’s wrinkles. IBM and HewlettPackard’sVerifone subsidiary are to work together to ensure compatibility of their products employing version 1.0 of the Secure Electronic Transactions (SET) specification. They plan to publish a Developers Reference Guide. Also Mastercard and Visa announced that they were extending until February the deadline for certificates issued under the preliminary SET 0.0 specification. A spokesman for Mastercard denied that this was slowing down the development of SET 1.0. InternetWeek, November 27, 1997,p. 7. Network security interest on rebound, Laura DiDio. After a lull at the beginning of the 199Os, membership to security organizations and visitors to security exhibitions and conferences has dramatically increased. The surge in Internet use, particularly for electronic commerce, has made companies increasingly concerned about the threat of hacker attacks. Computer security today is more than just virus security. Users must now be familiar with intrusion detection, firewalls, biometrics, audit trails, cryptography and digital signatures. Membership to the NCSA has doubled over the past two years and the organization has dramatically expanded the depth of its security offerings. It has an in-house lab that certifies the major anti-virus, cryptography, firewall and biometrics products. Most recently, the NCSA began certifying the security of Web sites. For an annual fee, the NCSA will provide companies with a set of guidelines, and then NSCA security engineers will conduct a remote assessment of the user’s Web server security. Computerworld, December 1, 1997, p. 4. Aventail secures VPNs down to the client, Sahatore Salamone.Virtual private networks let authorized users access network resources across the Internet or a corporate intranet. Sometimes, however, the users get more of a peek at the network than they should, exposing it to potential risk. Aventail Corp. is

trying to give IT managers more control over what network resources a user actually sees when using a VPN.The company’s approach adds an icon in a user’s Windows Explorer called ‘Intranet Neighborhood’. When a user clicks on this icon they see a list of the servers they have access to. The same level of control is extended to the File/Open and File/Save options. The Secure Enterprise Explorer not only narrows down the view of network resources, but gives a manager the ability to make access to those resources more secure. A manager can grant or deny access based on such things as user identity, source or destination address, application or encryption, or authentication method use. Secure Enterprise Explorer (SEE) integrates token and certificate-based authentication with Windows-based file systems. SEE allows the use of including Remote authentication systems Authentication Dial-In User Service, Secure Sockets Layer, SecurID and X.509 digital certificates. Internet Week, December 1, 1997, p. 9. IBM ups Web hosting security, Kate Getwig. By adding a virtual LAN-based architecture, IBM Global Web Solutions has increased security of its hosting services and reduced costs for customers. By creating a newVLAN environment at its main server farm, IBM eliminated the need to build separate LAN segments to provide customers with the security they need. IBM provides dedicated bandwidth to customers’ mainframes for data feeds and updates, using permanent virtual circuits separated by a firewall from the rest of the server farm.The company is trying to sell a high availability, very secure solution for the high end of the Web-hosting marketplace. In the past, IBM’s Web-hosting customers may have been sharing a token ring environment or an Ethernet segment, which could be a security risk for all the other companies if someone hacked into one customer’s site. Although having multiple customers’ boxes on a single LAN has been standard industry practice, high-end hosting companies are thinking about moving to this dedicated setup. Internet Week, January 5, 1998, p. 26. Sun changes security framework for Java Development Kit, Dauidjoachim.Version 1.2 of Sun Microsystems' Java Development Kit (JDK) is being given a new security framework that gives Java appli-