Touch Technologies, Inc. Product Offerings
Touch Technologies, Inc. Product Offerings
INTOUCH INSA - Network Security Agent
INTOUCH INSA
provides network-wide surveillance. All network-based user activity is
scanned---regardless of the computer manufacturer or operating system
being used.
Through the use of keystroke-level
surveillance, INTOUCH INSA detects:
- Users not authorized to access a particular
computer system
- Users allowed to access a particular computer system, but engaged
in unauthorized or suspicious activities
Network and system impact
INTOUCH INSA has no impact on network or system
performance. INTOUCH INSA requires no loading of
software to any system, anywhere on the network. Even INTOUCH INSA's
real-time display of user activity has absolutely no
impact on network or system performance!
The complete package
INTOUCH INSA comes complete---packaged as a turn-key system. Included
in the package is a devoted, high-speed, 64-bit RISC system.
Installation is quick and easy.
See the INTOUCH
INSA documentation for details.
Intrusion Detection
Over 80% of all computer crime comes from the inside!
Firewalls can slowdown an outsider who is breaking into your system.
But having a firewall in place will not stop or detect
unauthorized insider use of your computer systems. And, if a session is
hijacked, your firewall will be rendered ineffective!
INTOUCH INSA - Network Security Agent scans all user activity on your
networks, seven days a week, 24 hours a day. Whether the intrusion is
from the outside (firewall failure) or from the inside (unauthorized
insider activity), INTOUCH INSA detects the intrusion activity and
takes manager-defined actions.
Enforcing Computer-Use Policies
The enforcement of computer-use policies has become an impossible and
expensive undertaking. Thousands of workstations, PCs, terminals, and
super-mini computers are in use each day. Many systems are also
connected to LANs, WANs, and the Internet. Prior to the introduction of
INTOUCH INSA, there was no solution to this difficult task of policy
enforcement. Now, at last, with INTOUCH INSA, there is a solution!
How INTOUCH INSA does its job
Running on a devoted, high-speed, 64-bit RISC system, INTOUCH INSA
reads all network packets, reconstructs all user activity, and scans
the activity for possible computer-use policy violations. The scanning
is done automatically, in the background, and without any impact on the
network. The patterns to be scanned for can be customized by the
Network Security Manager.
When a possible policy violation is detected by INTOUCH INSA, the
Network Security Manager is alerted. Once alerted, the Network Security
Manager can review the incident, and even start a real-time display of
the possible violator's session.
INTOUCH INSA is inexpensive and highly effective
INTOUCH INSA's inexpensive and highly effective network intrusion
detection capabilities:
- Are hosted on a single Digital AlphaStation for high-speed,
real-time network traffic analysis and session reconstruction
- Use four detection techniques:
- Attack signature recognition
- Anomaly detection
- Source/destination analysis
- Network load analysis
- Provide both real-time and retrospective analysis
- Allow intrusion alerts to trigger events and take actions
- Track and analyze historical incident details
With INTOUCH INSA - Network Security Agent the Network manager and
Network Security Officer finally have a tool that
allows the automated tracking and logging of unauthorized or suspicious
activity---down to the keystroke level -- in real-time!
For additional information or an evaluation copy of INTOUCH INSA,
please contact:
[email protected]
Touch Technologies, Inc.
9988 Hibert St. #310
San Diego, CA 92131
or call us toll-free at 800-525-2527, FAX 619-566-3663
Global INTOUCH Home
Page
Questions or problems?
Contact:
[email protected]
Copyright (c) 1996 Touch Technologies,
Inc.