- Sep 25, 2000
- 22,135
- 5
- 61
A FW that strikes back at the attacker.
Sounds interesting.
http://www.symbiot.com/
Symbiot, Inc., an emerging leader in the field of Intelligent Security Infrastructure Management Systems (iSIMS), today announced the first IT security solution that can both repel hostile attacks on enterprise networks and accurately identify the malicious attackers in order to plan and execute appropriate countermeasures ? effectively fighting fire with fire.
Asymmetric responses require executive findings based on multiple attributions and prior failed attempts at resolution through the upstream providers and local jurisdictions. In these cases, the operations center may call for a variety of efforts, including: (1) escalated multilateral profiling and blacklisting of upstream providers; (2) distributed denial of
service counterstrikes; (3) special operations experts applying invasive techniques; and (4) combined operations which apply financial derivatives, publicity disinformation, and other techniques of psychological operations. These operations are conducted with appropriate consideration for restrictions on point targets and phase lines in the
battlespace.
sounds like a military planning session, not home computer security.
Sounds interesting.
http://www.symbiot.com/
Symbiot, Inc., an emerging leader in the field of Intelligent Security Infrastructure Management Systems (iSIMS), today announced the first IT security solution that can both repel hostile attacks on enterprise networks and accurately identify the malicious attackers in order to plan and execute appropriate countermeasures ? effectively fighting fire with fire.
Asymmetric responses require executive findings based on multiple attributions and prior failed attempts at resolution through the upstream providers and local jurisdictions. In these cases, the operations center may call for a variety of efforts, including: (1) escalated multilateral profiling and blacklisting of upstream providers; (2) distributed denial of
service counterstrikes; (3) special operations experts applying invasive techniques; and (4) combined operations which apply financial derivatives, publicity disinformation, and other techniques of psychological operations. These operations are conducted with appropriate consideration for restrictions on point targets and phase lines in the
battlespace.
sounds like a military planning session, not home computer security.