{"id":1537,"date":"2007-05-23T00:00:00","date_gmt":"2007-05-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/05\/23\/ibm-internet-security-systems-accelerates-network-performance-with-new-intrusion-prevention-applianc\/"},"modified":"2021-12-30T11:39:33","modified_gmt":"2021-12-30T11:39:33","slug":"ibm-internet-security-systems-accelerates-network-performance-with-new-intrusion-prevention-applianc","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/05\/23\/ibm-internet-security-systems-accelerates-network-performance-with-new-intrusion-prevention-applianc\/","title":{"rendered":"IBM Internet Security Systems Accelerates Network Performance with New Intrusion Prevention Applianc"},"content":{"rendered":"<p>IBM unveiled an intrusion prevention appliance that is designed to transmit and protect network traffic at core network speeds.  The new Proventia Network Intrusion Prevention System (IPS) GX6116 supports throughput of up to fifteen gigabits per second (Gbps) with preemptive protection for up to six Gbps of network traffic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By adding the Proventia Network IPS GX6116 to its Internet Security Systems (ISS) product line, IBM offers comprehensive, ahead-of-the-threat protection for the various layers of an enterprise network.<\/p>\n<p>High-performance applications such as Internet telephony that operate at the network core require security solutions capable of delivering high throughput, maximum scalability and low latency.  Fifteen gigabit per second (Gbps) throughput Six gigabit per second (Gbps) inspection Protection across eight network segments Configurable latency Protection at very high network speeds allows companies to implement security at the network core without impacting business and network performance.<\/p>\n<p>In addition to meeting the needs of large enterprises, the GX6116 also bolsters IBM ISS&#8217; ability to protect next-generation telecommunications networks, cellular IP Multimedia Subsystem (IMS) backbone networks, VoIP deployments and hosting environments by leveraging IBM ISS&#8217; protocol analysis technology.<\/p>\n<p>By infusing products with security intelligence from the IBM Internet Security Systems X-Force\u00ae research and development team and its unique IBM Virtual Patch\u00ae technology, IBM security solutions are designed to protect customers before their business assets are impacted by online intrusions.<\/p>\n<p>http:\/\/www.iss.net\/about\/press_center\/releases\/us_ips.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1537","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1537"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1537\/revisions"}],"predecessor-version":[{"id":4024,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1537\/revisions\/4024"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}