Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
April 2005

Intrusion Prevention: Top Layer's Attack Mitigator IPS 5500

Attack Mitigator IPS 5500 Top Layer Price: Starts at $25,000   Attack Mitigator IPS 5500   Enterprises that cast a skeptical eye at network IPSes a couple of years ago can no longer afford to ignore them. The sheer volume and complexity of traffic, the exposure to frequent attacks and the maturing of the IPS market are driving businesses to deploy automated response tools at the perimeter and in front of key subnets and mission-critical assets. With Attack Mitigator IPS 5500, Top Layer has established itself as a major IPS player. It detects and blocks malicious traffic through predefined and user-configurable rules, which are applied to a series of security subsystems without blocking legitimate traffic. False positives, the bane of IDSes, can be absolute show-stoppers for IPSes. The latest upgrade to Attack Mitigator addresses false positives by throttling down anomalous traffic instead of throwing it off the wire. Attack Mitigator does this in two ways: It tracks the number of concurrent connections from host to host on the ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Warning Lights

    Evolving risk dashboards will tell how secure you are and when something's wrong.

  • Ready For Takeoff

    Cutting costs was the only way to keep United Airlines flying high. Rich Perez's answer was to rebuild the network.

  • Rights of Passage

    Our tests found that most endpoint security products will enforce policy and network access. Their differences are in the details.

  • Damage Control

    ChoicePoint's Rich Baich faced the perfect storm: a huge security breach, intense media attention and a shareholder revolt. What he needed was an incident response plan to get him out of the hot seat.

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close