NetFort offers Heartbleed vulnerability detection

(Source: NetFort)

LANGuardian 12.0.7 mitigates risks of OpenSSL bug

Print

PrintPrint
Pro

Read More:

15 April 2014 | 0

Irish-based technology company NetFort, has released version 12.0.7 of its LANGuardian software that enables accurate detection of servers running SSL/TLS on any port across the network, allowing assessment of susceptibility to Heartbleed vulnerability.

Heartbleed is a critical flaw in OpenSSL, the open-source encryption standard used by the majority of websites to provide a secure connection between the service and the user. The module that allows open connections to be reused (or ‘keep-alive’) contains a security hole which, if exploited maliciously, could allow attackers to repeatedly access 64K of memory.

Using the built in Deep Packet Inspection engine which includes Content Based Application Recognition (CBAR) and a special decoder for the SSL protocol LANGuardian 12.0.7 includes enhancements to help troubleshoot Heartbleed.

Firstly, it detects all active SSL/TLS servers that have the heartbeat extension enabled. This can be used to form an inventory for further examination. LANGuardian then detects exploit attempts based on the Heartbleed vulnerability. This can be used to know if someone is trying to compromise your servers.

“This is one of the major advantages of Deeper Traffic Analysis systems like LANGuardian,” said John Brosnan, CEO, NetFort.

“They can be easily deployed on any network and in the case of flaws like Heartbleed because they analyse the packet contents not just the headers provide tremendous visibility and insight.”

Further information is available on the Netfort blog.

A free 30-day trial is also available.

 

 TechCentral Reporters

Read More:



Leave a Reply

Back to Top ↑