Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Node Validators: Page 10 of 13

The agent itself is also well-designed; it can query a wide range of components (files, registry settings, running processes) and optionally can be configured not to run under an administrator context. Juniper has figured out how to bring SUDO-like functionality (click here if you're not familiar with *nix's sudo) to an agent model--that really impressed us. Using a single-purpose service agent that offers an API, Juniper has an agent update mechanism that doesn't add another network-accessible listening process to the endpoint, which in turn doesn't increase the endpoint's external attack profile. By invoking the update agent, the Juniper agent can be upgraded without admin rights. Simple, but clever. If only other agent vendors would follow suit.

Pricing for the Juniper system depends on the number of concurrent endpoints that need protection. The IC 4000 supports from 100 to 3,000 simultaneous endpoints, and pricing ranges from $25,000 to $160,000. The IC 6000 supports from 250 to 25,000 simultaneous endpoints, and pricing ranges from $60,000 to $390,000. Both models support clustering.

The downside? Organizations must be comfortable with a choke-point model, and Juniper's approach addresses only some use cases. For example, Juniper's model will not comprehensively prevent node-to-node attacks; to mitigate that threat scenario you must block the node before it gets past the switch port. In addition, Juniper doesn't have the framework to support or communicate with other vendors; the IC and IE are designed to communicate only with Juniper products right now. But to its credit, this simplicity is what allows Juniper Infranet to deliver a lot of functionality from the get-go.

Juniper Unified Access Control Suite. Juniper Networks, (866) 298-6428, (408) 745-2000. www.juniper.net

Start-up ConSentry Networks has taken a conceptually simple yet innovative approach to NNV by introducing an inline device that sits above the switching infrastructure's "edge" layer and inspects traffic on its way up to the network core. While still in its infancy, the ConSentry LANShield is a purpose-built appliance that leverages FPGAs (Field-Programmable Gate Arrays), as many as two dozen fiber or copper ports that can support inline bridge or mirror modes, and a "128 core" processor MIPS architecture. Put another way, the unit has serious CPU horsepower. ConSentry says it can monitor and forward traffic with Layer 7 intelligence at 10 Gbps. Currently, however, the product is more IDS/IPS-like in its capabilities, with the only implemented twist being the ability to understand actual users and not simply IP addresses.