Avi Networks Ships Software-Defined ADC v15.2 with CSI Module
SAN FRANCISCO, CA: Avi Networks ships the latest version 15.2 of software-defined ADC (Load-Balancer) with new capabilities like the Continuous Security Insights (CSI) Module. The Module helps enterprises to constantly monitor the security statistics and quickly act on application vulnerabilities and attacks.
"Network administrators who cannot understand the current state of their systems cannot secure them. For most enterprises today, we believe that a healthy security profile is not just a nice-to-have but is mandatory for guaranteeing the health of the overall application experience for today's end users," says Dhritiman Dasgupta, VP of Marketing, Avi Networks.
On legacy ADC appliances, the network administrators rarely enabled the advanced security functionality, as they were designed by security experts. With 100 percent REST API support, Avi enables on-demand, elastic network services that were even handled by non-networking experts. Overcoming the legacy ADC appliances’ pitfalls, Avi accelerates customer acquisition and has delivered solutions to large scale cloud and SDN projects.
Recently, POODLE SSL attack was reported to exploit vulnerabilities in many internet based systems that incorporated SSL 3.0 encryption protocol. But the solution was relatively simple — turning off SSL 3.0 by reconfiguring all the systems. But this solution came with the expense of possibly damaging end-user experiences on websites and other apps.
Avi's CSI module collects and analyzes huge telemetry data points from users, networks, and computing systems portrays the impact of making change such as, turning off SSL 3.0, before it is actually done. Avi’s CSI module delivers three main functionalities for a full security lifecycle management:
Inspect: Security configurations and user-to-application traffic are incessantly analyzed to detect vulnerabilities, attacks and anomalies.
Inform: Admins are notified on the real-time security status and overall application health score via alerts, logs and more.
Mitigate: Measures against anomalous behavior are taken, by blocking users causing unusual network traffic for more serious threats.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....