Access "Hot Pick: BlueCat Networks' Adonis 1000"
This article is part of the June 2006 issue of Is your data safe from next-generation attackers?
DNS/DHCP Adonis 1000 BlueCat Networks Price: Starts at $9,995 BlueCat Networks Adonis 1000 The Adonis 1000 consolidates DNS and DHCP on one secure, easily administered box, reducing risk and saving precious management resources. BlueCat Networks' Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network addressing. Featuring rock-solid security and terrific management capabilities, this device quickly tames networks' ragtag patchwork of DNS and DHCP services, regardless of enterprise size. Placing DNS and DHCP services on a single hardened appliance minimizes maintenance and centralizes administration. Instead of having to keep track of new threats associated with the OS, BIND and DHCP, it's all amalgamated into a single system. A skilled attacker can easily exploit flaws in DNS software and the OS on which it runs through cache poisoning, DoS attacks and buffer overflows. Adonis is highly resistant to these kinds of attacks. It runs on a Debian Linux kernel (with an option for a ... Access >>>
Premium Content for Free.
Network Access Control: StillSecure's Safe Access 4.1
StillSecure's Safe Access 4.1
Hot Pick: BlueCat Networks' Adonis 1000
BlueCat Networks' Adonis 1000
Today's Attackers Can Find the Needle
EMERGING THREATS From massive botnets to targeted phishing and transacting Trojans, today's new breed of attacker is more dangerous than ever.
Intrusion Prevention: McAfee's IntruShield 3000
McAfee's IntruShield 3000
Unified Threat Management Guide for Managers
A special guide bringing together all types of threat management. Find advice on firewalls, IPS, antivirus, antispam and more.
Extrusion Detection: Security Monitoring for Internal Intrusions
Read a review of the security book Extrusion Detection: Security Monitoring for Internal Intrusions.
- Network Access Control: StillSecure's Safe Access 4.1
This is a definition of biometrics by sister site whatis.com.
Configuration Management: FullArmor's FullArmor PolicyPortal
FullArmor's FullArmor PolicyPortal
Recent releases: Security product briefs, June 2006
Learn about the security products released in June 2006.
Reworking Risk Policy
POLICIES Whether you manage policies manually or use automated tools, it is imperative to get your policies and systems in sync.
Exploring your Endpoint Protection Options
Understand your options for building an endpoint security solution. Get advice on network access control (NAC), Network Access Protection, endpoint security policy definition, enforcement and detection.
- Biometrics by WhatIs.com
Perspectives: Security training must be a visual, interactive experience
Security awareness training exercises must be interactive and visually stimulating, and must help users judge the validity and reliability of websites and web content.
On The Radar: Preparing for managed security services
Editor's Desk: Debating a national data protection law
Wanted: Federal Legislation
Ping: Don Ulsch
- Perspectives: Security training must be a visual, interactive experience
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...