PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
April 2005

Intrusion Prevention: Top Layer's Attack Mitigator IPS 5500

Attack Mitigator IPS 5500 Top Layer Price: Starts at $25,000   Attack Mitigator IPS 5500   Enterprises that cast a skeptical eye at network IPSes a couple of years ago can no longer afford to ignore them. The sheer volume and complexity of traffic, the exposure to frequent attacks and the maturing of the IPS market are driving businesses to deploy automated response tools at the perimeter and in front of key subnets and mission-critical assets. With Attack Mitigator IPS 5500, Top Layer has established itself as a major IPS player. It detects and blocks malicious traffic through predefined and user-configurable rules, which are applied to a series of security subsystems without blocking legitimate traffic. False positives, the bane of IDSes, can be absolute show-stoppers for IPSes. The latest upgrade to Attack Mitigator addresses false positives by throttling down anomalous traffic instead of throwing it off the wire. Attack Mitigator does this in two ways: It tracks the number of concurrent connections from host to host on the ...

Access this PRO+ Content for Free!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

Safe Harbor

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Warning Lights

    Evolving risk dashboards will tell how secure you are and when something's wrong.

  • Ready For Takeoff

    Cutting costs was the only way to keep United Airlines flying high. Rich Perez's answer was to rebuild the network.

  • Rights of Passage

    Our tests found that most endpoint security products will enforce policy and network access. Their differences are in the details.

  • Damage Control

    ChoicePoint's Rich Baich faced the perfect storm: a huge security breach, intense media attention and a shareholder revolt. What he needed was an incident response plan to get him out of the hot seat.

Columns in this issue