Third Brigade unveils Deep Security 6.0

Sixth version of Third Brigade's Deep Security software adds file-integrity monitoring, log inspection and integration with VMware's vCenter management server.

Third Brigade Tuesday unveiled the sixth version of its server-based host firewall and intrusion detection/prevention software, Deep Security, adding functionality for file-integrity monitoring, log inspection and connectivity with VMware's vCenter management server.Deep Security 6.0 now includes a method for file-integrity monitoring based on digital-hash technology, according to Bill McGee, founder and vice president of product services. "For registry and file programs, you can configure it to exclude changing certain files. And you may want to know if unauthorized software has been installed," McGee says. "We're looking for potentially malicious or unauthorized changes."

Deep Security 6.0 also now includes a log-inspection capability based on technology Third Brigade gained in its acquisition last June of open source software provider OSSEC. OSSEC software remains available under open source terms, McGee adds.

"The purpose of the log inspection is to help get high-quality alerts to the customer's security information management,"  McGee says.

Another new feature in Deep Security 6.0 is what McGee calls Virtual Center integration, which allows Third Brigade's management components to connect and receive information directly from VMware's management component, vCenter Server. "We're connecting to vCenter via the API to pull in the state of the data center," McGee says.

Down the road Third Brigade may pursue something similar for other virtual environments, including those from Microsoft and Citrix XenSource.

Deep Security 6.0 is offered as functional modules, and starts at $150 per server for 500 servers up to $600 per server.

Learn more about this topic

Trend Micro, Third Brigade team on IPS

Third Brigade makes its debut at RSA Conference

IPS systems still not used full throttle: survey

Insider Shootout: Best security tools for small business
Join the discussion
Be the first to comment on this article. Our Commenting Policies