[May 05, 2006]

Mirage Networks NAC Stops IM Nagache.a Worm Day Zero

Mirage Networks NAC Stops IM Nagache.a Worm Day Zero
Network Access Control Solution Terminates Worm Untrackable By Other Measures

Austin, Texas – May 5, 2006 – The newest instant messaging (IM) threat that defeats many security solutions is no match for Mirage Networks technology, the company reports today. This new attack is taking advantage of the rapid adoption of IM in the corporate environment, propagating across AOL and MSN instant messengers, as well as via email and network shares, plants a bot on infected devices, then uses peer-to-peer networks to communicate with its handler.




It is this peer-to-peer communication with the threat originator that makes this threat difficult, if not impossible, for most security solutions to find and stop. The company points to its patent-pending behavioral rule set as the reason for its network access control (NAC) solution’s efficacy in terminating this new threat, for which many devices are unprepared.



Citing a recent study reported in the April 2006 issue of CSO magazine, Greg Stock, senior vice president of sales and marketing, Mirage Networks, states, “The numbers are startling: today, 85 percent of enterprises are using IM, 90 percent of IM-related threats use worm propagation, and, if recent history is any guide, the attacks are only going to get more vicious and more sophisticated. That’s why the industry needs the Mirage NAC approach, which finds and stops these threats in their tracks, no matter how new they are or what device they’re on.”



Mirage NAC uses behavioral rules to detect when devices are either spreading threats or violating policies, even if, as in this case, the threat is a new one, and patches are either unavailable or not yet installed. It then surgically isolates the device in question, avoiding cross-infection while enabling remediation, before allowing the device renewed access to network resources. In so doing, it stops damage from threats introduced onto the network by mobile computing, remote connections, and day-zero malware—complementing perimeter security solutions and giving companies a more complete, in-depth security defense infrastructure.



About Mirage Networks
Mirage Networks is committed to defending the network interior with the industry’s easiest to implement network access control solutions. Delivered through a global channel of VARs, SIs, OEMs and MSSPs, the company’s patent-pending technology gives IT managers control in the uncontrollable environment of infected, unmanaged and out-of-policy devices. Its appliance-based approach deploys out of band, and requires neither signatures nor agents to terminate day-zero threats and enforce policies, while ensuring a positive user experience. Delivering security from the moment any device enters the network, Mirage solutions provide powerful answers to the problems of securing networks with heterogeneous infrastructures and fluid perimeters. Based in Austin Texas, Mirage Networks is a consistent winner of industry awards and recognition. Learn more at www.miragenetworks.com.

Media Contact:
Alison Guzzio
Mirage Networks
610.925.2761
alison@guzzio.com

[ Back To Cloud Computing 's Homepage ]