Digital Edition

SYS-CON.TV
New Predator Watching Over IBM BladeCenter
PredatorWatch Auditor Enterprise Now On eServer

PredatorWatch's Auditor Enterprise is now available on the IBM eServer BladeCenter. The asset-based, security and vulnerability management software ported to IBM's eServer BladeCenter platform complements IBM's "Security in a Box" strategy. Auditor Enterprise, combined with other best-of-breed security applications, such as firewall, VPN and intrusion prevention, can help large private enterprises and government organizations reduce security costs, while increasing the performance of security applications in their network IT infrastructure.

"Auditor Enterprise is a great fit for IBM's 'Security in a Box' concept," said Gary Miliefsky, president and CEO, PredatorWatch. "Combining our vulnerability management and clientless quarantine solution for Network Admission Control (NAC) with other Linux-based security applications provides an integrated infrastructure that allows customers to easily deploy and manage the security component of their network IT infrastructure."

Auditor Enterprise offers true proactive network security by dynamically detecting and automatically quarantining common vulnerabilities and exposures (CVE) at the port level. The CVE standard is an open-source listing of all publicly known vulnerabilities and security exposures that cause over 95% of all network security breaches. The list is maintained by MITRE Corporation and funded by the Department of Homeland Security.

IBM BladeCenter systems collapse the complexity of corporate datacenters by integrating servers, networks, storage and applications in one system based on Calibrated Vectored Cooling, the industry's most advanced systems-cooling architecture. With integrated switches and modules, IBM BladeCenter customers no longer need to purchase additional switches, power supplies or cooling, decreasing overall cabling by 80%.

"IBM continues to grow its solutions portfolio based on IBM eServer BladeCenter platform," said Juhi Jotwani, director of the BladeCenter alliances, IBM. "As a member of the BladeCenter Alliance Program, PredatorWatch provides IBM customers with a simple solution to a complex problem. Consolidating multiple security applications within BladeCenter provides a powerful, manageable and cost-effective platform."

About Security News Desk
SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

CI/CD is conceptually straightforward, yet often technically intricate to implement since it require...
Fact: storage performance problems have only gotten more complicated, as applications not only have ...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ag...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems ...
Containers, microservices and DevOps are all the rage lately. You can read about how great they are ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can ...
When building large, cloud-based applications that operate at a high scale, it’s important to mainta...
While some developers care passionately about how data centers and clouds are architected, for most,...
"Peak 10 is a hybrid infrastructure provider across the nation. We are in the thick of things when i...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use ...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and ap...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO an...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple ...
In this presentation, you will learn first hand what works and what doesn't while architecting and d...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: D...
The now mainstream platform changes stemming from the first Internet boom brought many changes but d...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018,...
The Internet of Things will challenge the status quo of how IT and development organizations operate...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news an...
More and more companies are looking to microservices as an architectural pattern for breaking apart ...