Access "Product review: Mu-4000 Security Analyzer"
This article is part of the June 2008 issue of Five crucial virtualization do's and don'ts
SYSTEM/DEVICE TESTING Mu-4000 Security Analyzer REVIEWED BY ED SKOUDIS Mu Security Price: Starts at $40,000; $300,000 with all modules--protocol mutations, published vulnerability and DoS--and gold support The Mu-4000 is a traffic generation, testing and test-monitoring tool focused on creating network attack patterns and illegitimate traffic, and measuring their impact on target machines. Since Information Security's last analysis of the Mu-4000 in December 2006, Mu Security has significantly increased the capabilities of its flagship product, adding new testing capabilities and monitoring options. Test Comprehensiveness B+ The Mu-4000 offers a vast number of different tests, including mutated traffic, published vulnerabilities and DoS attacks. The mutation engine is a top-notch commercial fuzzer, iterating through patterns of attack traffic, launching billions of different combinations of packets to find zero-day vulnerabilities in target software. Mu's published vulnerability analysis feature generates traffic for known attack vectors and flaws, ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Virtualization server security best practices
by Thomas Ptacek
Avoid server virtualization security bad practices with these dos and don'ts. Get info on virtualization products, segmentation, implementation, avoiding malware, and staging, deploying and patching virtual machines, segmentation and implementation.
-
Product review: Credant Mobile Guardian 6.0
MOBILE SECURITY
-
Product review: Klocwork Insight 8.0
SOFTWARE SECURITY
-
Embedded Security Safeguards Laptops
Tech Focus: Secure From Within
-
Security Awareness Employee Training Essential to Infosec Program
Security awareness training initiatives such as online tutorials, newsletters, MP3s and prizes get the security message across to users.
-
Virtualization server security best practices
by Thomas Ptacek
-
-
Spam Blockers Losing Ground on Sophisticated Attackers
SPAM Spam hasn't been "solved"; in fact, the scourge has grown worse as attackers continually trump countermeasures and refine their focus on high-value targets.
-
Product review: Mu-4000 Security Analyzer
SYSTEM/DEVICE TESTING
-
Product review: Array Networks SPX2000
SSL VPN
-
Security Services: QualysGuard Security and Compliance Suite
At Your Service
-
GRC Tools Help Manage Regulations
GOVERNANCE, RISK AND COMPLIANCE We look at three GRC products and the distinct ways these tools can help organizations navigate the complicated regulatory game.
-
Spam Blockers Losing Ground on Sophisticated Attackers
-
Columns
-
CISOs Must Innovate to Enable Business
Editor's Desk: Be an Enabler
-
Architect Security and Compliance Programs to Be Complementary
Perspectives: Shake On It
-
Address Authentication and Transaction Validation Protocols to Stem Identity Theft
Layer8: Tarnishing Good Names
-
Interview: Financial Services CISO David Pollino
CISO Uses Predictive Analystics to Bolster Risk Management Program
-
CISOs Must Innovate to Enable Business
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO