SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Paint The Table -- Ignore unavailable to you. Want to Upgrade?


To: Oral Roberts who wrote (15183)2/19/2002 9:38:18 AM
From: AugustWest  Read Replies (1) | Respond to of 23786
 
No, I was thinking of still selling some short. I was thinking of waiting to see if it printed below 35 now. Thanks.



To: Oral Roberts who wrote (15183)2/19/2002 9:39:23 AM
From: Augustus Gloop  Read Replies (1) | Respond to of 23786
 
Internet Security Systems Helps Customers Protect Wireless Networks, Unveils Industry's First Wireless Security Assessment Solution
Internet Security Systems' Founder Christopher Klaus to Address Wireless Security Concerns and Solutions as Key Speaker at RSA Conference


ATLANTA, Feb 19, 2002 /PRNewswire-FirstCall via COMTEX/ -- In response to the growing demand for wireless security awareness and protection and building on its pioneering role in security assessment technology, Internet Security Systems, Inc. (Nasdaq: ISSX chart, msgs) unveiled today the industry's first wireless security assessment solution, Wireless Scanner(TM). The Wireless Scanner software's patent-pending technology extends Internet Security Systems'(TM) wireless security expertise, adding an automated wireless audit product to its existing wireless security solution that includes X-force(TM) checks for wireless components from our wired-network products, wireless security consulting, education and managed security services and education.

As companies of all sizes and industries continue to rapidly adopt wireless LAN (WLAN) technology into their work environments to support core business processes and improve their employee mobility, they need to identify and address wireless LAN security vulnerabilities in order to successfully minimize their risks and protect their critical IT infrastructures. In addition, pervasive concerns about the wide range of security risks associated with wireless LAN technology can often present obstacles to deployment.

"'Drive by hacking' is fast becoming a reality as unsecured, and often unauthorized, wireless access points become an intruder's dream backdoor into a company's network, circumventing the front door firewall and other network security measures. In major cities, an intruder can cheaply equip their laptop with wireless technology, sit within range and invisibly monitor traffic, access applications, and hijack data flowing over someone else's wireless network," said Christopher Klaus, founder and chief technology officer for Internet Security Systems. "Customers desperately need the ability to pinpoint and minimize wireless security risks. The Wireless Scanner software dramatically improves the ability to identify unauthorized devices and successfully address the growing vulnerabilities that wireless technology poses today."

Christopher Klaus will be presenting "802.11 Security and Audit" at the RSA(R) Conference 2002 on Wednesday, February 20 at 10:15 a.m. PST. Although the low cost and technical simplicity of WLAN devices allow business units within enterprises to deploy the technology, most enterprises have little experience configuring WLAN securely. Klaus will discuss attack threats and scenarios surrounding widespread WLAN vulnerabilities and will describe technology and techniques for IT departments to locate insecure WLAN segments. Klaus will emphasis IEEE 802.11 management traffic decoding and analysis, techniques for auditing and discovering WLAN devices, and recommendations for increasing security beyond Wireless Equivalent Privacy (WEP) implementations.

Key Benefits of the Wireless Scanner Software:

* Secure Wireless -- The Wireless Scanner software extends the Internet
Security Systems X-Force's security research to cover the emerging
realm of the wireless network. With the Wireless Scanner software,
organizations can discover their vulnerability to attack or misuse by
internal users and off-site attackers who seek to use wireless
connections to circumvent the security measures that protect wired
networks.
* Facilitate WLAN Implementation -- The Wireless Scanner software permits
organizations to 'go wireless' faster and with greater confidence.
Management reports and detailed fix information offer clear guidance
for quickly securing their wireless access points. By helping to ensure
secure deployment of wireless networks, the Wireless Scanner software
enables organizations to realize the productivity gains of wireless
without sacrificing the security of their data infrastructure.
* Ease of Use -- As an extension of Internet Security Systems' market-
leading security assessment expertise, the Wireless Scanner software is
based on the security audit solutions already familiar to security and
network administrators. This allows organizations to secure their
wireless-enabled networks, and deploy new WLANs, more rapidly and cost-
effectively.

Key Features of the Wireless Scanner Software:
* Detection -- The Wireless Scanner software detects 802.11 access points
from inside and outside an organization's physical site. By listening
to wireless traffic over the air, the Wireless Scanner software is able
to identify the unauthorized, often unsecured access points that can
provide attackers a gateway into an organization's network, as well as
track clients, and even detect client attacks against wireless access
points.
* Security Assessment -- The Wireless Scanner software also actively
probes discovered access points to determine their vulnerability to
attack and connection from an unauthorized user. Assessments detect
whether security options such as encryption and authentication are
enabled and properly configured, and the Wireless Scanner software
operators can direct it to connect to access points, provide management
information, and read encrypted traffic.
* Reporting -- The Wireless Scanner software enables administrators to
quickly identify and secure vulnerable access points by providing
formatted and sortable reports that display clear information on WLAN
devices, configuration, and vulnerabilities. Graphical summary reports
give a high-level view of an organization's WLAN security status for an
at-a-glance understanding of WLAN security issues, while technician
reports provide detailed fix information for any vulnerabilities
discovered to speed and simplify remediation of wireless security
issues.
* Mobility -- Wireless technology projects the network perimeter beyond
the physical confines of an organization's site, and laptop-based
Wireless Scanner software permits operators to take the Wireless
Scanner software outside their building to simulate the activity of an
off-site attacker outside their premises. On-site, the Wireless
Scanner software's mobility allows operators to roam as they listen for
access points and other devices, moving through space to detect signals
that are would be inaccessible to a fixed device.
* Security Architecture Consulting -- Organizations can seek help from
Internet Security Systems' experts as they assess, integrate, securely
design, and configure their WLANs and the surrounding network and
security products.
* SecureU(TM) Education Services -- As an offering to Internet Security
Systems SecureU industry-leading education services, an Xtreme Wireless
Security course was developed with Internet Security Systems founder
Christopher Klaus and the latest R&D from the X-Force. Xtreme Wireless
Security helps to better understand the nuances of WLAN security and
establish valid defensive techniques that can be used to minimize
security risks. Due to Internet Security Systems' leadership position
in WLAN security, Key3Media Event's NetWorld+Interop(R) 2002 Las Vegas
has invited Internet Security Systems to present its Xtreme Wireless
Security class as a one-day workshop. The class will take place on
Monday, May 6 from 8:30 a.m. to 4:30 p.m., featuring an introduction by
Internet Security Systems' founder and chief technology officer,
Christopher Klaus. Please visit www.interop.com or call 888-886-4057
for more information.
* Managed Security Services -- As WLAN protection features are added to
Internet Security Systems security software products, ISS' Managed
Security Services continues to integrate these capabilities into its
remote managed security services offerings, delivering seamless
protection capabilities for customers.

Availability

The Wireless Scanner software product is expected to be available in March.

For a wireless security white paper as well as more information regarding wireless security and Internet Security Systems wireless security solutions, please visit Internet Security Systems online at www.iss.net/wireless .

About Internet Security Systems

Founded in 1994, Internet Security Systems (ISS) is a pioneer and world leader in software and services that protect critical information assets from an ever-changing spectrum of threats and misuse. As organizations increasingly move business operations online, the number and sophistication of threats to the networks, servers and desktops that empower these initiatives also continue to escalate. Internet Security Systems' solutions dynamically detect, prevent and respond to these threats, making Internet Security Systems the trusted security provider for more than 9,000 corporate customers. These include 49 of the Fortune 50, the top 10 largest U.S. securities firms, 10 of the world's largest telecommunications companies and major agencies and departments within U.S. local, state and federal governments. Headquartered in Atlanta, GA, Internet Security Systems has additional operations throughout the Americas, Asia, Australia, Europe and the Middle East. For more information, visit the Internet Security Systems Web site at www.iss.net or call 888-901-7477.

This release, other than historical information, includes forward-looking statements made pursuant to the "safe harbor" provisions of the Private Securities Litigation Reform Act of 1995. The risks and uncertainties which could cause actual results to differ materially from those in the forward- looking statements include, but are not limited to, the following: the level of demand for the Company's products; the volume and timing of orders; product and price competition; the Company's ability to expand its domestic and international sales and marketing organizations; the Company's ability to develop new and enhanced products; the Company's ability to assimilate recent and potential future acquisitions or investments; the Company's ability to attract and retain key personnel; reliance on distribution channels through which the Company's products are sold; the growth in the acceptance and use of the Internet and of private Internet-based networks or "intranets"; the extent to which unauthorized access to and use of online information is perceived as a threat to network security; customer budgets; the assertion of infringement claims with respect to the Company's intellectual property; foreign currency exchange rates; and risks concerning the rapid change of technology; and general economic factors. These risks and others are discussed in the Company's periodic filings with the Securities and Exchange Commission. These filings can be obtained either by contacting ISS Investor Relations or through the Securities and Exchange Commission's Web site at "http://www.sec.gov".

Internet Security Systems, Wireless Scanner, X-Force, and SecureU are trademarks of Internet Security Systems, Inc. All other companies and products mentioned are trademarks and property of their respective owners.