Navy taps WheelGroup for intrusion-detection products

The Navy has selected WheelGroup Corp.'s NetRanger intrusion-detection and security management system to protect its networks worldwide.

As part of its global network security strategy the Navy will deploy NetRanger systems in selected land- and sea-based networks and monitor them from its network operations center WheelGroup announced last week. BTG Inc. WheelGroup's supplier to the Defense Department will provide worldwide integration services to support the deployment.

NetRanger is designed to detect unauthorized use from internal and external users in real time and to automatically eliminate the attack from the network. The product also is designed to command network devices such as routers and switches to modify security policy "on the fly" and to prevent an attacker from gaining future access to the network.

Security vendors combine offerings

Entrust Technologies Inc. announced last week a new sec ure enterprise desktop suite for secure e-mail World Wide Web services authentication access control file/folder encryption and anti-virus detection of encrypted files.

In addition Entrust and Symantec Corp. announced a joint development and licensing agreement for their technologies which will include Entrust adding Symantec's Your Eyes Only and Norton Antivirus desktop security products to its new suite.

Symantec will license Entrust's public-key infrastructure technology and layer it over Symantec anti-virus products to create a Norton secure desktop suite according to Symantec.

Entrust's new suite is based on a security kernel that has been validated by the National Institute of Standards and Technology as meeting security requirements for federal agency use for data encryption digital signatures and key management.

ISS rolls out next-generation of intrusion-detection software

Internet Security Solutions last week announced its next-generation intrusion-detection software RealSecure 2.0.

The product which ISS will add to the Air Force's Unified Local-Area Network Architecture II contract is designed to provide real-time monitoring to enable network administrators to intercept and respond to external security breaches and internal abuse before systems are compromised.

RealSecure 2.0 includes a new enhanced architecture designed to provide a faster more comprehensive ability— including increased support for more types of networks and platforms— to detect and stop network abuse according to company officials. The product now includes support for Fast Ethernet and Token Ring. In addition the product is designed to provide a wide range of response options to attacks including logging a suspicious session for later review automatically terminating a session for later review and reconfiguring other firewalls and routers to ward off intruders before they can do further damage to a network.

BBN system passes Navy sub test

BBN Technologies announced last month that the Navy successfully sea-tested its Distant Thunder system a commercial off-the-shelf hardware and software system that the Cambridge Mass.-based company developed with the Defense Advanced Research Proj-ects Agency.

This advanced anti-submarine warfare system which has been under development for the past six years enables multiple ships that use sonar to search for enemy submarines in shallow coastal regional waters to communicate with each other and process sonar data said Jude Nitsche BBN's vice president and director of the company's Washington D.C. operations.


  • FCW Perspectives
    zero trust network

    Can government get to zero trust?

    Today's hybrid infrastructures and highly mobile workforces need the protection zero trust security can provide. Too bad there are obstacles at almost every turn.

  • Cybersecurity
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    NDAA process is now loaded with Solarium cyber amendments

    Much of the Cyberspace Solarium Commission's agenda is being pushed into this year's defense authorization process, including its crown jewel idea of a national cyber director.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.