Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Counter Hacking Appliance Demonstration at RSA

Mykonos Software : 26 February, 2010  (Company News)
Mykonos Software will be presenting a demonstration of a web application security appliance which provides real-time counter hacking capability
Mykonos Software, developers of Web application security technology, have announced the world's first 'counter-hacking' appliance — called the Mykonos Security Appliance.

The Mykonos Security Appliance gives system administrators and security staff a real-time view of hackers as they introspect Web applications. It profiles hackers in real-time, ascertaining their location, skill level and other critical data, and enables IT staff to instantly deploy counter-measures.

The Mykonos Security Appliance is targeted at financial services and insurance companies, healthcare companies, e-commerce companies, government entities, and other high profile targets of Web-based hacking attempts.

Mykonos is showcasing its new Mykonos Security Appliance on stand 452 at the RSA Conference, March 1-5, in San Francisco.

"As businesses continue to deploy applications to the Web, they are exposing a massive attack surface for hackers to exploit," said David Koretz, President and CEO of Mykonos Software. "The primary security threat for businesses has shifted from the network layer to the application layer.'

The Mykonos Security Appliance grew out of the Mykonos team's experience in hosting Web applications and creating the first development framework for building secure Web applications. Today's Web application firewalls are flawed because they attempt to protect by using rules-based policies that are challenging to implement and offer only point-in-time reporting. Web Application Firewalls also do not protect against client-side code, which is where the majority of Web application threats exist. Most traditional enterprise security solutions sit on the network and have no way to protect the client or code — and no way to respond to attacks in real-time with counter measures.

The Mykonos Security Appliance works by hardening the code as it is delivered to the client to detect potentially malicious activity as it happens, evaluating the sophistication of that activity, and countering the activity with a variety of measures such as fake responses to confuse the hacker so that they move on to easier targets elsewhere. The Mykonos Security Appliance identifies the hacker so that future intrusion attempts can be highlighted as repeat visits and thwarted appropriately, and it even gathers personal data on the hacker to turn over to law enforcement, if desired.

'No matter how many firewalls and defences are put up, hackers will eventually find ways around," said Al Huizenga, Director of Product Management at Mykonos Software. 'The goal of the Mykonos Security Appliance is to turn a mirror on the hacker and use counter-intelligence tactics to identify them while gaining intelligence about their skill level. More importantly, for the first time system administrators can defend their systems in real-time by launching counter-measures against the hacker."

Mykonos Director of Product Management Al Huizenga is offering live hacking demonstrations at the RSA conference at the Mykonos stand #452. Mr Huizenga will show both the hacker's view and the enterprise view of a real-time hacking attempt of a corporate enterprise Web application. The demo will show how the Mykonos appliance detects and evaluates the threat level of the malicious activity, and responds automatically with appropriate counter-hacking manoeuvres.
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo