contact contact contact
  Articles | Editorials | Reviews | InfoSec Directory | News | Press Releases
Router Protection is Necessary in 2005
Publication date: Friday, 21 January 2005

DeepNines Technologies discusses how the recently announced Cisco Systems vulnerabilities spell trouble for network security

DALLAS — Jan. 20, 2005 — How safe is the router? Not too safe. “From a security standpoint, 2005 is the year that the router becomes the Achilles heel of the network,” says Dan Jackson, president and COO of DeepNines Technologies, the only company capable of protecting networks from in front of the router.

DeepNines’ vision of routers as targets could already be coming true. On Jan. 19, Cisco Systems announced new vulnerabilities for the Internetwork Operating Software (IOS) that runs its routers for Cisco IOS Telephony Service (ITS), Cisco CallManager Express (CME) or Survivable Remote Site Telephony (SRST). According to information from Cisco, “A successful exploitation of this vulnerability may cause a reload of the device and could be exploited repeatedly to produce a Denial of Service (DoS).”

“Where there’s smoke, there’s fire – meaning these won’t be the last router vulnerabilities we hear about this year,” Jackson said. “Cisco’s greatest asset, its large market share, could become one of its most glaring weaknesses. Just as Microsoft’s market share makes it a target for attackers, so, too, Cisco could begin to suffer attacks more regularly. The real problem is that there has been virtually no protection for routers – until now. Our DeepNines Security Edge Platform™ sits invisibly in front of the router, monitors all traffic coming in and out and stops or traps the bad traffic before it’s able to harm the network.”

The DeepNines Security Edge Platform, which is placed in front of the router, would be able to ensure that all packets coming into and out of the network are inspected for malformation or malicious behavior. The platform’s behavior monitors also could determine if there was an increase of traffic to vulnerable ports and further inspect that traffic for malicious intent.

Cisco advisory document No. 63708 says that “affected devices that must run ITS, CME or SRST are vulnerable, and there are not any specific configurations that can be used to protect them … and putting firewalls in strategic locations may greatly reduce exposure until an upgrade can be performed.” See: http://www.cisco.com/warp/public/707/
cisco-sa-20050119-itscme.shtml#workarounds.

“We wonder exactly how a company is supposed to put a firewall in front of its router if it is on a DS3 or a T1,” Jackson said. “The DeepNines Security Edge Platform extends out in front of the router to provide the same layers of protection that otherwise are offered only behind firewalls, where, in some cases, it’s too late if bad traffic has made its way that far inside.”

About Deep Nines, Inc.
DeepNines offers a scalable security platform for Global 2000 companies with a vertical market focus in education, government, telecommunications, energy and financial services. The DeepNines Security Edge Platform™ integrates intelligent firewall, intrusion prevention, best-of-breed secure content management, forensics and reporting. It operates outside the network infrastructure, improving organizations’ security “deep into the nines.” DeepNines’ Security Edge Platform, the company’s patent-pending security system, is a fully automated signature and behavior-based intrusion prevention and traffic management system preventing known and unknown attacks from entering an organization’s network. The Security Edge Platform runs on Solaris and Linux platforms from Sun Microsystems. To learn more about Deep Nines visit www.deepnines.com.


SecurityWatch - 24x7 advisory and vulnerability automated monitoring service.

GFI LANguard Network Security Scanner - Network-wide security vulnerability scanning & fixing - Free version available.

Network Security Software - Sponsored by GFI Network Security.

InfoSec Directory
» Smart-Phone Attacks and Defenses
» Preventing Spyware Infestation
» Preliminary study: Bluetooth Security
» An initiative extending SMTP to include email sender identity and reputation
» Identity Assurance in a Virtual World
Latest Press Releases
» Kavado Announces Defiance Risk Management System (RMS) to Support Compliance Reporting for Web Applications Security
» The Middleburgh Telephone Company Chooses Motorola’s Multi-Service Access Platform to Deliver Next Generation Triple-Play Services
» Keynesis Ltd. Announces the Release of Lockngo Professional Version 3.0
» net.com Customises SHOUT Family to Deliver VoIP Migration Appliance (VMA)
» Free Vulnerability Scan Now Available for SANS Top 20 Quarterly Update
» WiFi Manager Integrates Support For DLINK, SMC, LINKSYS and Nomadix Wireless devic
More Articles
» Understanding Rich Internet Applications
» Voice and Data Convergence - a Vendor’s Perspective
» Making Firewall Do the Work: Stateful Packet Inspection
» Four Things You Must Know Before Deploying Wireless LANs
» Put spyware on the security map
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter