Skip to main content

Reflex Security's official announcement on Citrix support


Just got this from Reflex Security's PR:

Atlanta, Ga. – January 28, 2007 – Reflex Security, the leader in integrated network security for data center, core networks, and virtual environments, today announced that Reflex VSA (Virtual Security Appliance) now supports Citrix XenServer. Reflex will be exhibiting at Citrix Summit this week in booth # 412.

Reflex Virtual Security Appliance provides a new layer of security for the virtual environment providing comprehensive intrusion prevention or detection, LAN-based firewall, network access control, IP to ID, and network discovery for traffic inside virtual network. Reflex VSA protects virtual server environments which are subjected to many of the same security threats that physical servers are subjected to. Reflex VSA offers proven technology no only to secure virtual environments but to increase overall security for the entire organization by leveraging the virtualization platform

“We’re pleased to lead the market by adding support for Citrix XenServer virtual machines,” said Hezi Moore, CTO and founder of Reflex Security. “As organizations increasingly adopt virtualization strategies many are realizing that a total security solution for virtual environments is needed. Through integration of network security with the virtual infrastructure, organizations are able to adopt and deploy “defense in depth” best practices without the traditional high costs and complexities associated with physical infrastructure.”

Reflex VSA provides the following security features and security coverage for the virtual network and virtual machines:

  • Visibility and awareness of the virtual environment
  • Security inspection of the virtual network and VM communications
  • Security and segregation among Virtual Machines
  • Access and control for servers and devices that access the virtual network.
  • Security compliance (PCI, HIPAA, SOX, GLBA)

Reflex Security’s architecture provides cohesive, multi-layered protection of virtualized machine resources by addressing the essential security problems faced by CSOs and Network Managers implementing Citrix and VMware virtual servers in production environments.

“We certainly see the need to offer our customers a solid security solution for virtualization and we are starting to see increasing interest in Citrix XenServer from clients that are considering virtual servers,” said Dave Mast, sales and marketing manager of Precision Computer Services, a Reflex partner and Citrix Gold channel partner based in CT. “Customers will be much more likely to implement a virtual server strategy if they know that leaders like Reflex Security are providing security for their environments with a proven solution like VSA.”

Availability
Reflex VSA supports VMware and Citrix virtual servers and is available now for purchase and/or a 15-day trial download. Visit http://www.reflexsecurity.com/reflex_vsa.php for more information.

About Reflex
Reflex Security is the leader in integrated network security for data center, core networks, and virtual environments. Delivered on chassis-based, appliance-based and virtual machine platforms, Reflex employs high-performance deep packet inspection to combine firewall, intrusion prevention (IPS), anomaly detection, network access control (NAC) and anti-spyware capabilities, all of which are managed from a single integrated console. The company’s patent pending software includes a multi-threaded, multi-core architecture that allows Reflex to run on carrier-grade, high availability, multi-gigabit chassis; price/performance leading security appliances, VMware’s ESX server, and Citrix’s XenServer.

Reflex Security is a registered trademark of Reflex Security, Inc. All other marks are property of their respective owners.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op...