You are here: IT-Observer ? Press Releases RSS | White Papers |

Voice Over Ip Performance And Security Now Protected By Tippingpoint's Unityone Intrusion Prevention Systems





AUSTIN, Texas - Feb. 18, 2004 - TippingPoint Technologies, Inc. (NASDAQ: TPTI), the leader in intrusion prevention, today announced that its customers are protected against cyber threats on voice over IP (VoIP) through UnityOne Intrusion Prevention Systems (IPS). UnityOne customers are also able to manage bandwidth and traffic policies to allocate more bandwidth and priority to VoIP.

Kip McClanahan, chief executive officer of TippingPoint, said, "VoIP exemplifies the convergence of the Internet and the phone network. With this convergence, we're seeing the simultaneous creation of both new opportunity and new risk. Communication efficiency and cost reduction must be measured against new exposures to cyber threats and potential attacks on our critical infrastructure. TippingPoint is the first company to develop a solution that takes into account the security and performance complexities of VoIP usage and attacks."

UnityOne's Application Protection provides comprehensive attack prevention against VoIP vulnerabilities. TippingPoint delivers Virtual Software Patches through a Digital Vaccine service to maintain evergreen protection. For example, TippingPoint issued a virtual patch to shield against exploitation of recently disclosed vulnerabilities in the H.323 telephony protocol commonly used in VoIP applications. Tools to exploit these vulnerabilities were published on the Internet January 26, and TippingPoint issued virtual patches to block these exploits the same day. TippingPoint customers are also protected against malformed packets, blended threats, denial of service attacks, and SYN flood attacks.

TippingPoint's UnityOne provides bandwidth management capabilities that enable administrators to set policies and shape traffic by application or IP address. Administrators can also throttle other applications like instant messaging or peer-to-peer traffic to give priority to VoIP. The UnityOne's Layer 2-7 total flow inspection capability enables it to accurately classify traffic. Malicious traffic is immediately discarded before it reaches its target. Other traffic performs according to policies set by administrators.

About TippingPoint Technologies TippingPoint Technologies is the leading provider of network-based intrusion prevention systems that deliver in-depth protection and attack eradication for corporate enterprises, government agencies, service providers and academic institutions. This innovative approach offers customers an effective network-based security solution with unrivaled economics, ultra-high performance, scalability and reliability. TippingPoint is based in Austin, Texas and can be contacted through its Web site at www.tippingpoint.com or by telephone at 1-88UNITYONE.

TippingPoint Technologies, the TippingPoint logo, UnityOne, the UnityOne logo and Digital Vaccine are registered trademarks of TippingPoint Technologies, Inc.

TippingPoint Forward-Looking Statements
This announcement contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. These forward-looking statements are subject to significant risks and uncertainties. Although the company believes that the expectations reflected in its forward-looking statements are reasonable, the company can give no assurance that such expectations or any of their forward-looking statements will prove to be correct, and future results may differ from those discussed in this press release. Important information regarding the factors that may affect the company's future performance is included in its public reports that it files with the Securities and Exchange Commission. The company disclaims any intention or obligation to revise any forward-looking statements whether as a result of new information, future event, change in expectations, conditions or circumstances, or otherwise. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of the date hereof. The inclusion of any statement in this release does not constitute an admission by the company or any other person that the events or circumstances described in such statement are material.

Prevent data theft & viruses through network connected USB sticks, PDAs & media players. Control user access to endpoint connections with GFI EndPointSecurity - Free trial!

Visit GFI Security Software page for more information.

IT-Gear.com - Weblog dedicated to everything concerning IT tools and services.

Latest News

SECUDE appoints Open-Source specialist as Linux Expert
02.11.06??SECUDE IT Security GmbH has confirmed the appointment of Felipe Rodriguez, a Linux Kernel contributor and owner of the Open-Source project MGSTEP, as its Linux Expert.

Increased Spam Fuelled Through Botnet Activities
02.11.06??MessageLabs, a provider of integrated messaging and web security services to businesses worldwide, has announced the results of its Intelligence Report for October 2006.

How to keep your VoIP net safe
30.10.06??One of the major challenges in implementing a converged network is having a coherent security policy for the management and control of a system that is carrying voice, video and data.

User tricks, security treats
30.10.06??Thirteen malevolent spirits may haunt the halls and cubicles of your company, and if you're going to scare them into security compliance you may need to get a little bit spooky yourself.

10 Steps to More Secure Wireless
27.10.06??We have all heard about the stories of spammers using open home wireless networks to fill the net with junk mail.

BT acquires Counterpane Internet Security
25.10.06??BT has announced that it has acquired Counterpane Internet Security, a provider of managed networked security services, as part of its strategy to expand and develop its global professional services capabilities.

Perdemia updates Permission Analyzer
25.10.06??Perdemia has upgraded Permission Analyzer, a powerful Windows administration tool that quickly determines whether the system access permissions are properly set, need to be changed, or have been altered by people who are not authorized to make changes.

Mac OS Bluetooth exploit - Inqtana.d
25.10.06??Inqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.

Copyright ? IT-Observer Online Publication 2000 - 2006 Top | RSS Feeds | About Us
Site Meter