Third Brigade Upgrades Security Platform

Third Brigade has launched Third Brigade Deep Security 6, which provides server and application security. The latest release adds three product enhancements to complement the existing Deep Security host intrusion prevention system and firewall.

First, the system integrates with VMware vCenter to simplify deployment and give increased visibility into an organization's VMware environment. Although managing the security of virtual machines is the same as for their physical counterparts, what's more challenging is having visibility into whether a virtual machine is "paused" or offline.

Second, two new product modules--integrity monitoring and log inspection--have been added to support PCI compliance initiatives and detect malicious behavior targeting virtual machines and physical servers. The new integrity monitoring module generates alerts on operating system and application changes that could signal attacks, while the new log inspection module is built using the multiplatform log monitoring capabilities of the OSSEC open source host intrusion detection project.

Third, the company has modified its packaging scheme to allow its security modules to be purchased individually or as a set and then deployed and managed centrally.

"Because of the open nature of a university's IT environment, the perimeter gets bombarded from all sides, and we are constantly asked to do more with very little resources," said Ralph Michaelis, CIO at Carleton University. "We turned to Third Brigade for our physical and virtual server protection and are now looking to the cloud to increase IT efficiencies, while maintaining the same level of security."

"Enterprises oftentimes find themselves deploying several small physical VMware ESX clusters in order to meet security zoning requirements," said Chris Wolf, senior analyst and virtualization expert for Burton Group. "Host-based security deployed to VM guest operating systems can allow organizations to move enterprise security to the virtual infrastructure, which may allow them to realize higher consolidation densities and more efficient utilization of shared infrastructure."

The Deep Security 6 modules are available for Microsoft Windows, Solaris, Red Hat, and SUSE server platforms. They work with VMware, Citrix, and Microsoft virtualization platforms. The software also protects these servers and applications when deployed in cloud computing environments such as Amazon EC2, GoGrid, or others.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • glowing digital brain above a chessboard with data charts and flowcharts

    Why AI Strategy Matters (and Why Not Having One Is Risky)

    If your institution hasn't started developing an AI strategy, you are likely putting yourself and your stakeholders at risk, particularly when it comes to ethical use, responsible pedagogical and data practices, and innovative exploration.

  • laptop screen with a video play icon, surrounded by parts of notebooks, pens, and a water bottle on a student desk

    New AI Tool Generates Video Explanations Based on Course Materials

    AI-powered studying and learning platform Studyfetch has launched Imagine Explainers, a new video creator that utilizes artificial intelligence to generate 10- to 60-minute explainer videos for any topic.

  • cloud and circuit patterns with AI stamp

    Cloud Management Startup Launches Infrastructure Intelligence Tool

    A new AI-powered infrastructure intelligence tool from cloud management startup env0 aims to turn the fog of sprawling, enterprise-scale deployments into crisp, queryable insight, minus the spreadsheets, scripts, and late-night Slack threads.

  • Stylized illustration showing cybersecurity elements like shields, padlocks, and secure cloud icons on a neutral, minimalist digital background

    Microsoft Announces Security Advancements

    Microsoft has announced major security advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.