Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Rolling Review: Cenzic's Hailstorm Enterprise Application Risk Controller: Page 2 of 5

Shorter term, get yourself a Web application scanner with Ajax capabilities.

Going Under The Hood

In the IDS/IPS world, one topic that splits vendors into two camps is that of open versus closed signatures. While companies like IBM ISS regard their signatures as secret sauce and tie them closely into the flow of traffic through various decoders and detectors, other products, such as in the popular open-source Snort IDS, decouple the signature language from the processing engine so that signatures can easily be understood and modified.

The same conundrum applies to Web application scanners. When using the open-signature approach and a false positive crops up, it's easy to not only see why it occurred, but you can adjust the signature to minimize recurrence of the error. Likewise, a product with an open-signature language allows for creation of new sigs.


This article is the first of a series and is part of NWC's Rolling Review of Web Applications Scanners. Click on that link to go to the Rolling Reviews home page to read all the features and reviews now.

Which is best? That depends on the environment. For those who want a hands-off product, the closed-system approach isn't a drawback. But companies with unique needs, and the time and energy to invest in adapting products to their environments, will find an open-signature language crucial.