Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Protect Web Services with the Teros 200

The Teros 100 Secure Application Gateway is one of the most effective security appliances on the market and has been chosen by the CRN Test Center as its 2003 Product of the Year. Teros' newest unit, the Teros 200, incorporates a dual-CPU design to double throughput and protect twice as many Web servers as the Teros 100. The device features transparent session failover capability to eliminate single points of failure and includes dual power supplies and two hard drives for redundancy.

Teros' adaptive technology guards against potential threats by differentiating them from normal Web traffic. The vendor's appliances learn an application's proper behavior and block any activity that deviates from the norm. The Teros 100 and 200 can therefore protect against undocumented attacks without relying on signatures.

Teros examines incoming and outgoing Internet traffic at the packet level to perform realtime security analysis. The units run a hardened version of Linux, which makes it easy to upgrade and add functionality.

Teros uses the HTML Interaction Model (HIM) process to control traffic between browsers and web servers. In the process, however, HIM can mistake some traffic as an attack, especially when Web developers have implemented nonstandard programming techniques. But Teros' learning mode lets solution providers trend and catalog both typical and atypical Web traffic to fine-tune network traffic policies.

Web services are a valuable business tool for automating business processes, e-commerce transactions and the exchange of valuable data. Unfortunately, Web service interfaces also give hackers new targets to attack. Teros' Web Services Security Gateway, incorporated into both the Teros 100 and 200, defends against the most common application-layer attacks such as buffer overflow attacks, SQL injection attempts and denial-of-service (DoS) attacks by using application learning and attack defenses.

  • 1