Feeds

Cisco makes up term 'dark web,' fights it with appliance

Web 2.0 tripe filtered on the fly

Top 5 reasons to deploy VMware with Tegile

In the absence of proper categorization, egregious websites rule the internet, free to terrorize the hapless workers of web 2.0 with wanton non-productivity.

Or at least that's how Cisco paints the landscape of a so-called "dark web," a term the networking giant has coined for an estimated 80 per cent of the internet that's not being correctly categorized by today's URL-filtering databases. Cisco blames the status quo on fly-by-night web 2.0 blogs, micro-blogs, weenie-mini-micro-blogs, social networking websites and what have you that are built on dynamic content and collaboration technologies.

Said sites have a high amount of churn, and not only risk legal liability, but the sucking dry of employee attention, according to Cisco. Lucky it's selling a product that solves the issue. It even has a kick-ass name.

Cisco's newfangled "dark web" busting technology is being sold in the form of a software blade on Cisco IronPort S-Series security appliances. The secret sauce is a dynamic content analysis engine backed by Cisco's Security Intelligence Operations database, which the company claims sees over a third of global network traffic.

S-series becomes world's greatest detective

Cisco has some numbers: it says there's about 45 billion web pages overall and 32 million new domains are being added each year. The result is a web of darkness that can't neatly be listed by older URL filtering databases, a problem Cisco reckons will grow exponentially over time.

Enter yonder merchandise. Cisco's IronPort S-Series appliances normally perform more standard malware filtering. (Cisco bought IronPort back in 2007 for $803m.) The new Web Usage Controls software blade for the appliance adds the ability to identify content in blocked categories based on Cisco's database and an on-the-fly content analysis engine. Cisco claims the technology will accurately identify 90 per cent of dynamic web 2.0 content that's unseen by list-based filtering.

The Web Usage Controls blade includes a URL database with 65 categories and coverage for sites in more than 200 countries and over 50 languages, Cisco said. The database is also updated every five minutes by Cisco's security ops.

But we're cool, right Cisco? Totally a productive website.

IronPort S-Series appliances with Web Usage Controls are being sold starting at $8,500. ®

Beginner's guide to SSL certificates

More from The Register

next story
It's Big, it's Blue... it's simply FABLESS! IBM's chip-free future
Or why the reversal of globalisation ain't gonna 'appen
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Microsoft and Dell’s cloud in a box: Instant Azure for the data centre
A less painful way to run Microsoft’s private cloud
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
CAGE MATCH: Microsoft, Dell open co-located bit barns in Oz
Whole new species of XaaS spawning in the antipodes
AWS pulls desktop-as-a-service from the PC
Support for PCoIP protocol means zero clients can run cloudy desktops
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.