Feeds

Symantec defends HP's Itanium servers

Not from ridicule. From intruders

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Symantec this week proved that it's willing to make sure low volume products are just as secure as big sellers by delivering an intrusion protection package for HP's line of Itanium processor-based servers running the HP-UX operating system.

The EPIC architecture developed by HP and Intel for Itanium contains a number of unique security hooks for compartmentalizing data not found with RISC and x86 chips. Symantec claims to have made use of these security features with Intruder Alert 3.6 for HP-UX 11i Version 2 but doesn't really elaborate on exactly what it has done in any publicly available information. That said, users should expect to see the standard Intruder Alert functions such as system monitoring, automatic responses to breaches, and server audits.

Crafting a product specifically for Itanium is a brave proposition for Symantec given the slow sales of the chip. HP, however, delivers the vast majority of Itanium server shipments and has seen a strong improvement in its Integrity server sales over the past year. If you're going to zero in on Itanium, then HP and HP-UX are the way to go.

Start-up Secure64 has pledged to do even more with Itanium's security features to help vendors such as HP create lines of speedy, safe server appliances.

There's more information on Symantec's Intruder Alert software here. ®

Related stories

HP and Apple end iPod affair
Intel pitches Pentium M-based 'Sossaman' server chip
AMD's Opteron decimates Xeon market
Intel overcomes 'weak' line-up during Q2
Intel and Dell thrilled to join the dual-core server chip era
SGI shares plummet as deal closing malady lingers

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.