Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

A Look at Blue Lane VirtualShield: Page 2 of 8

 

Consider a buffer overflow: VirtualShield recognizes there's too much data in an API call and truncates the data, the same way the vendor's patch does. This technique renders network traffic at least as safe as the original patch would have, before it reaches the server. Blue Lane maintains inline patches for server versions of Microsoft Windows; Red Hat Enterprise Linux; SUSE Linux; FreeBSD; MS Exchange and Sendmail; Cyrus and Courier IMAP; MS SQL; the Apache, IIS and iPlanet Web servers; and apps such as Samba, Bind and WuFTPd. The company partners closely with Oracle and VMware, and its physical PatchPoint appliance offers protection for Oracle databases.

One key feature Blue Lane offers: inline patches to protect software, such as Windows NT, for which the vendor is no longer issuing patches. This lets IT run outdated but business-critical apps with fewer security concerns.

You may wonder, why analyze suspicious network traffic at all when you could just block it?

There are occasions when simply dropping packets on the floor will cause problems. Consider e-mail passing between two Exchange servers. If a message contains malicious content, such as a buffer overflow, an IPS could recognize that fact and dump the packets, or maybe even be nice and send a TCP Reset. But then the sending server will try to send the traffic again, get blocked again, and so on.

 

Another problem could arise when a Web server is using pooled connections to a back-end database. Say someone tries to pass a SQL injection attack. An IPS between the Web and database servers would kill the connection ... but that would take out all Web transactions, not just the malicious one.