The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Captus Networks Case StudySummaryAs businesses grow increasingly dependent on the Internet, they grow more vulnerable to hackers. In several high profile cases, hackers devised cunning ways to send tidal waves of phony traffic to targeted Web sites, drowning company Web servers in sham requests. Such Denial of Service (DoS) attacks cripple a Web site and destroy its ability to respond to customers. And in e-Business, 24x7 availability is everything. When customers can’t get online, they take their business elsewhere, as the competition is just a click away.Network security startup Captus Networks has an answer. Its CaptIO* network security device provides immediate and automatic protection from DoS attacks through inline policy-based monitoring of network traffic. Because it sits inline with network traffic rather than offline, everything about CaptIO has to be fast. Captus Networks selected the Intel® PRO/1000 Fiber Server Adapter to integrate Gigabit speeds over fiber optic cabling into its solution.CHALLENGE: Move Data at Gigabit SpeedsUnlike passive network monitoring solutions, which sit offline and merely provide notification of an attack, the CaptIO is a proactive, inline solution that stops DoS (and Distributed Denial of Service – DDoS) attacks before they damage business-critical net-works. The CaptIO uses Captus Networks’ Traffic Limiting Intrusion Detection System (TLIDS*), which identifies a DoS attack and automatically implements policy-based rules based on specific information in the header or a packet. This information can be source and destination addresses, port numbers, or protocols. This allows CaptIO to surgically stop the attack while allowing legitimate traffic to get through. Read the full Captus Networks Case Study.
RSA 2012 Intel keynote speech provides architectural insights to tomorrow’s security infrastructure.
Complementary big data solutions for enterprises