Internet Security Systems Helps Customers Protect Wireless Networks, Unveils Industry's First Wireless Security Assessment Solution Internet Security Systems' Founder Christopher Klaus to Address Wireless Security Concerns and Solutions as Key Speaker at RSA Conference
ATLANTA, Feb 19, 2002 /PRNewswire-FirstCall via COMTEX/ -- In response to the growing demand for wireless security awareness and protection and building on its pioneering role in security assessment technology, Internet Security Systems, Inc. (Nasdaq: ISSX chart, msgs) unveiled today the industry's first wireless security assessment solution, Wireless Scanner(TM). The Wireless Scanner software's patent-pending technology extends Internet Security Systems'(TM) wireless security expertise, adding an automated wireless audit product to its existing wireless security solution that includes X-force(TM) checks for wireless components from our wired-network products, wireless security consulting, education and managed security services and education.
As companies of all sizes and industries continue to rapidly adopt wireless LAN (WLAN) technology into their work environments to support core business processes and improve their employee mobility, they need to identify and address wireless LAN security vulnerabilities in order to successfully minimize their risks and protect their critical IT infrastructures. In addition, pervasive concerns about the wide range of security risks associated with wireless LAN technology can often present obstacles to deployment.
"'Drive by hacking' is fast becoming a reality as unsecured, and often unauthorized, wireless access points become an intruder's dream backdoor into a company's network, circumventing the front door firewall and other network security measures. In major cities, an intruder can cheaply equip their laptop with wireless technology, sit within range and invisibly monitor traffic, access applications, and hijack data flowing over someone else's wireless network," said Christopher Klaus, founder and chief technology officer for Internet Security Systems. "Customers desperately need the ability to pinpoint and minimize wireless security risks. The Wireless Scanner software dramatically improves the ability to identify unauthorized devices and successfully address the growing vulnerabilities that wireless technology poses today."
Christopher Klaus will be presenting "802.11 Security and Audit" at the RSA(R) Conference 2002 on Wednesday, February 20 at 10:15 a.m. PST. Although the low cost and technical simplicity of WLAN devices allow business units within enterprises to deploy the technology, most enterprises have little experience configuring WLAN securely. Klaus will discuss attack threats and scenarios surrounding widespread WLAN vulnerabilities and will describe technology and techniques for IT departments to locate insecure WLAN segments. Klaus will emphasis IEEE 802.11 management traffic decoding and analysis, techniques for auditing and discovering WLAN devices, and recommendations for increasing security beyond Wireless Equivalent Privacy (WEP) implementations.
Key Benefits of the Wireless Scanner Software:
* Secure Wireless -- The Wireless Scanner software extends the Internet Security Systems X-Force's security research to cover the emerging realm of the wireless network. With the Wireless Scanner software, organizations can discover their vulnerability to attack or misuse by internal users and off-site attackers who seek to use wireless connections to circumvent the security measures that protect wired networks. * Facilitate WLAN Implementation -- The Wireless Scanner software permits organizations to 'go wireless' faster and with greater confidence. Management reports and detailed fix information offer clear guidance for quickly securing their wireless access points. By helping to ensure secure deployment of wireless networks, the Wireless Scanner software enables organizations to realize the productivity gains of wireless without sacrificing the security of their data infrastructure. * Ease of Use -- As an extension of Internet Security Systems' market- leading security assessment expertise, the Wireless Scanner software is based on the security audit solutions already familiar to security and network administrators. This allows organizations to secure their wireless-enabled networks, and deploy new WLANs, more rapidly and cost- effectively.
Key Features of the Wireless Scanner Software: * Detection -- The Wireless Scanner software detects 802.11 access points from inside and outside an organization's physical site. By listening to wireless traffic over the air, the Wireless Scanner software is able to identify the unauthorized, often unsecured access points that can provide attackers a gateway into an organization's network, as well as track clients, and even detect client attacks against wireless access points. * Security Assessment -- The Wireless Scanner software also actively probes discovered access points to determine their vulnerability to attack and connection from an unauthorized user. Assessments detect whether security options such as encryption and authentication are enabled and properly configured, and the Wireless Scanner software operators can direct it to connect to access points, provide management information, and read encrypted traffic. * Reporting -- The Wireless Scanner software enables administrators to quickly identify and secure vulnerable access points by providing formatted and sortable reports that display clear information on WLAN devices, configuration, and vulnerabilities. Graphical summary reports give a high-level view of an organization's WLAN security status for an at-a-glance understanding of WLAN security issues, while technician reports provide detailed fix information for any vulnerabilities discovered to speed and simplify remediation of wireless security issues. * Mobility -- Wireless technology projects the network perimeter beyond the physical confines of an organization's site, and laptop-based Wireless Scanner software permits operators to take the Wireless Scanner software outside their building to simulate the activity of an off-site attacker outside their premises. On-site, the Wireless Scanner software's mobility allows operators to roam as they listen for access points and other devices, moving through space to detect signals that are would be inaccessible to a fixed device. * Security Architecture Consulting -- Organizations can seek help from Internet Security Systems' experts as they assess, integrate, securely design, and configure their WLANs and the surrounding network and security products. * SecureU(TM) Education Services -- As an offering to Internet Security Systems SecureU industry-leading education services, an Xtreme Wireless Security course was developed with Internet Security Systems founder Christopher Klaus and the latest R&D from the X-Force. Xtreme Wireless Security helps to better understand the nuances of WLAN security and establish valid defensive techniques that can be used to minimize security risks. Due to Internet Security Systems' leadership position in WLAN security, Key3Media Event's NetWorld+Interop(R) 2002 Las Vegas has invited Internet Security Systems to present its Xtreme Wireless Security class as a one-day workshop. The class will take place on Monday, May 6 from 8:30 a.m. to 4:30 p.m., featuring an introduction by Internet Security Systems' founder and chief technology officer, Christopher Klaus. Please visit www.interop.com or call 888-886-4057 for more information. * Managed Security Services -- As WLAN protection features are added to Internet Security Systems security software products, ISS' Managed Security Services continues to integrate these capabilities into its remote managed security services offerings, delivering seamless protection capabilities for customers.
Availability
The Wireless Scanner software product is expected to be available in March.
For a wireless security white paper as well as more information regarding wireless security and Internet Security Systems wireless security solutions, please visit Internet Security Systems online at www.iss.net/wireless .
About Internet Security Systems
Founded in 1994, Internet Security Systems (ISS) is a pioneer and world leader in software and services that protect critical information assets from an ever-changing spectrum of threats and misuse. As organizations increasingly move business operations online, the number and sophistication of threats to the networks, servers and desktops that empower these initiatives also continue to escalate. Internet Security Systems' solutions dynamically detect, prevent and respond to these threats, making Internet Security Systems the trusted security provider for more than 9,000 corporate customers. These include 49 of the Fortune 50, the top 10 largest U.S. securities firms, 10 of the world's largest telecommunications companies and major agencies and departments within U.S. local, state and federal governments. Headquartered in Atlanta, GA, Internet Security Systems has additional operations throughout the Americas, Asia, Australia, Europe and the Middle East. For more information, visit the Internet Security Systems Web site at www.iss.net or call 888-901-7477.
This release, other than historical information, includes forward-looking statements made pursuant to the "safe harbor" provisions of the Private Securities Litigation Reform Act of 1995. The risks and uncertainties which could cause actual results to differ materially from those in the forward- looking statements include, but are not limited to, the following: the level of demand for the Company's products; the volume and timing of orders; product and price competition; the Company's ability to expand its domestic and international sales and marketing organizations; the Company's ability to develop new and enhanced products; the Company's ability to assimilate recent and potential future acquisitions or investments; the Company's ability to attract and retain key personnel; reliance on distribution channels through which the Company's products are sold; the growth in the acceptance and use of the Internet and of private Internet-based networks or "intranets"; the extent to which unauthorized access to and use of online information is perceived as a threat to network security; customer budgets; the assertion of infringement claims with respect to the Company's intellectual property; foreign currency exchange rates; and risks concerning the rapid change of technology; and general economic factors. These risks and others are discussed in the Company's periodic filings with the Securities and Exchange Commission. These filings can be obtained either by contacting ISS Investor Relations or through the Securities and Exchange Commission's Web site at "http://www.sec.gov".
Internet Security Systems, Wireless Scanner, X-Force, and SecureU are trademarks of Internet Security Systems, Inc. All other companies and products mentioned are trademarks and property of their respective owners. |