SHARE
Facebook X Pinterest WhatsApp

Assuming Your System Security Is Compromised

The vast majority of security threats that wind up causing the most damage within IT organizations are fairly well known. The problem is that there hasn’t really been an effective way to deal with them. But Federated Networks CEO David Lowenstein says that’s all about to change with the emergence of a new Application Security Layer […]

Written By
MV
Mike Vizard
Nov 22, 2010

The vast majority of security threats that wind up causing the most damage within IT organizations are fairly well known. The problem is that there hasn’t really been an effective way to deal with them.

But Federated Networks CEO David Lowenstein says that’s all about to change with the emergence of a new Application Security Layer (ASL) protocol that is at the heart of a FN-Connect Secure Architecture developed by Federated Networks.

Intended as a way to augment venerable secure sockets layer (SSL) technology, Lowenstein says the company has spent five years developing an approach that identifies so called ‘man-in-the-middle’ attacks such as phishing, pharming, DNS poisoning and proxying.

Federated Networks, which today announced that the BT Ethical Hacking Center has validated its technology, claims to have essentially created a new layer of security software to ‘neutralize’ these attacks. This new layers sits alongside traditional security software that was created to protect, detect, monitor and recover.

The problem, says Lowenstein, is that traditional security software assumes you can prevent the malware from getting onto systems in the first place. Federated Networks, says Lowenstein, starts out with the assumption that the malware is going to get onto your system one way or another. It’s the job of the security software to neutralize it once it gets on your system.

However the task of securing our systems gets handled may not be all that much of a concern to customers. What they have noticed is that they have invested hundreds of thousands of dollars in security, and they still have problem with relatively simple malware attacks.

So maybe the time has finally come to try a different approach, but the one thing that is for certain is that current approaches to IT security are leaving a lot to be desired.
 

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.