More serious security was discussed in this session on network protection. These solutions launched at DEMO 2006 are focused on improved network protections and tuning:
It takes less than five minutes to configure the Bio-NetGuard system from Shimon Systems. This system provides fingerprint-based security for wireless networks right at the wireless access point. Their small hardware device serves as the access control mechanism. Great quote from the company: "If there was a better way to do it, we would have done it," and "We recommend that you set up at least three fingerprints, some from each hand in case you lose the use of one." LMAO. I hope these guys make it.
Cesura (founded by the folks from Tivoli) is a system that identifies business disruptions proactively for IT staff. The idea is to notice performance degradation before it becomes bad enough to be a drag - or worse, a complete block - on business. The company cites stats such as a 50% reduction in recovery time on average. "Fewer disruptions, faster recovery." (Or so the tagline says.)
Fortify worries about corporate espionage, denials of service, and other malicious behaviors enabled by hackable software. The company showed how a hacker could get access to code via SQL injection. (If you've ever seen a page of code after erring on an online form submission, you've seen this code.) Fortify wants to protect the software, not secure the network.
The IronPort security applicances take the same protections developed for e-mail security, and repurpose them to protect systems against spyware and other online threats. The company is working to reintroduce trust to the online experience, and has implemented reputation ratings systems in order to reduce spyware, phishing, and the like.
The FrontPorch PorchLight demo started with a hysterical video showing how a user was plagued by spies, viruses, and zombies without even knowing they were lurking with her wherever she went. PorchLight is an applicance that directly notifies users when they are infected and instructs them on the appropriate cleanup tasks. Enterprises can also monitor users' use of high-risk (and often prohibited) applications such as Kazaa, and notify them when they are running afoul of IT management policies, and what they need to do to keep their system clean.
Tested Technologies has magic software that makes your network, cell phone, etc. invisible to IP hackers. The company's Hyperblocking technology makes the server look as it was unplugged. Predictive technology separates the good guys from the bad guys. Hyperblocking collects data from around the internet in order to synthesize address associations, and actively probes IP addresses. "It's like using a sketch artist to solve a crime." What a great way to collect information from the community, for the good of the community.
Tags: christine herron christine.net space jockeys demo 2006 shimon cesura fortify ironport frontporch tested technologies technology