A new security appliance that collects, stores and correlates large volumes of log information was unveiled by Network Intelligence Inc. at last month’s InfoSecurity 2002 show in New York City. The new device, called LogSmart, is a 2U-high (3.5 inches) rack-mountable appliance that collects security information from other network devices such as firewalls, intrusion detection systems, routers and application servers. LogSmart can collect information from up to 3,000 separate devices and capture logged events from source devices at a rate of more than 30,000 events per second (eps), according to Network Intelligence. The product is available now.

NetScreen embraces SSL with SafeWeb pact

NetScreen Technologies Inc. is joining other IP Security VPN vendors that recognize customers want a simpler, less-expensive, secure remote-access method to supplement their VPNs. The company is teaming up with SafeWeb Inc. to provide a Secure Sockets Layer-based remote-access alternative that requires no additional SSL client software on remote machines. That is because SafeWeb’s Secure Extranet Appliance (SEA) Tsunami gear uses SSL technology already embedded in Web browsers. Other makers of VPN gateways, such as Nortel Networks Corp., already have made provisions to include these simpler remote-access alternatives that operate at the application layer rather than the network layer.

Vernier aims to boost WLAN security

Vernier Networks Inc. has released an updated version of its wireless LAN management software and launched a new range of wireless controllers. Both sets of products are aimed at boosting security and simplify administration of enterprise WLANs. Version 3.0 of the Vernier Networks System software adds: Virtual LAN tagging, based on IEEE 802.1q, to create a wireless VLAN based on user ID, group affiliation, or location; Internet Group Management Protocol, which lets a data stream send the same information to several wireless users or groups at the same time; Programmable access control, which lets net managers apply security policies based on several criteria.