Avi Networks Ships Software-Defined ADC v15.2 with CSI Module
SAN FRANCISCO, CA: Avi Networks ships the latest version 15.2 of software-defined ADC (Load-Balancer) with new capabilities like the Continuous Security Insights (CSI) Module. The Module helps enterprises to constantly monitor the security statistics and quickly act on application vulnerabilities and attacks.
"Network administrators who cannot understand the current state of their systems cannot secure them. For most enterprises today, we believe that a healthy security profile is not just a nice-to-have but is mandatory for guaranteeing the health of the overall application experience for today's end users," says Dhritiman Dasgupta, VP of Marketing, Avi Networks.
On legacy ADC appliances, the network administrators rarely enabled the advanced security functionality, as they were designed by security experts. With 100 percent REST API support, Avi enables on-demand, elastic network services that were even handled by non-networking experts. Overcoming the legacy ADC appliances’ pitfalls, Avi accelerates customer acquisition and has delivered solutions to large scale cloud and SDN projects.
Recently, POODLE SSL attack was reported to exploit vulnerabilities in many internet based systems that incorporated SSL 3.0 encryption protocol. But the solution was relatively simple — turning off SSL 3.0 by reconfiguring all the systems. But this solution came with the expense of possibly damaging end-user experiences on websites and other apps.
Avi's CSI module collects and analyzes huge telemetry data points from users, networks, and computing systems portrays the impact of making change such as, turning off SSL 3.0, before it is actually done. Avi’s CSI module delivers three main functionalities for a full security lifecycle management:
Inspect: Security configurations and user-to-application traffic are incessantly analyzed to detect vulnerabilities, attacks and anomalies.
Inform: Admins are notified on the real-time security status and overall application health score via alerts, logs and more.
Mitigate: Measures against anomalous behavior are taken, by blocking users causing unusual network traffic for more serious threats.