Third Brigade Unveils First Intrusion Prevention System (IPS) That is Not Intrusive

Share Article

Deep Security 4 is small, fast and simple, and with IPS-ready mode it fundamentally alters the deployment of IPS for an enterprise.

Third Brigade today unveiled Deep Security 4, an advanced, software-based, intrusion prevention system (IPS). It allows organizations to protect mission critical systems, custom web applications and sensitive data from malicious attacks that exploit software vulnerabilities. It helps ensure compliance with regulations such as PCI (Visa CISP, MasterCard SDP, etc.), and protects and enhances revenue and service levels. With Deep Security 4, enterprises can now make servers, desktops and laptops IPS-ready, before the next major vulnerability is announced or exploited.

Intrusion prevention is an important layer of defense for security-conscious healthcare, government, financial services and other organizations. And, it is increasingly being recognized by manufacturers of telecommunications, medical and other network-connected systems as an integral security component. These systems are often considered high value, high risk, or hard to patch.

“Traditionally, intrusion prevention systems have been very intrusive. They have large footprints, often require custom hardware, and consume considerable host and staff resources,” said Brian O’Higgins, Chief Technology Officer of Third Brigade. “In addition, it has historically taken significant time to test, deploy and fine-tune an IPS. Third Brigade Deep Security 4 and its unique IPS-ready approach fundamentally alter the deployment of IPS for an enterprise.”

Organizations that purchase Third Brigade Deep Security Manager can deploy Deep Security Agent software in IPS-ready mode, on as many hosts as they choose, at no extra cost. Then with one-click, the Agent can provide proactive prevention of the hosts. This vastly reduces the risk of deployment surprises, provides a more efficient, effective and intelligent roll-out, and helps ensure enterprises are ready before the next major vulnerability is announced or exploited. It also helps ensure that the security of systems, applications and data is not restricted by budget or resources.

Deep Security has been architected from the ground up for intrusion prevention and is small, fast and simple to use.

Small: It consumes few host resources. Deep Security’s optimized deep packet inspection algorithm minimizes CPU and memory impact to the host. The footprint for the kernel mode enforcement point is under 300 kB, and the Agent is less than 3MB. Multiple filter types (smart, vulnerability and exploit) are organized into compact profiles that contain only the filters that are necessary to protect the target host.

Fast: Deep Security’s deep packet inspection is up to 10 times faster than a SNORT-based system, allowing the host to operate more efficiently. In addition, with rapid assessment, installation, pre-defined profiles, and an intuitive GUI, Deep Security allows organizations to make the transition to intrusion prevention in hours, not days or weeks.

Simple: The intuitive, personalized dashboard provides powerful summaries of system status, which minimizes administration effort. Flexible deployment options can easily accommodate the deployment of intrusion prevention without changing the network or organization.


Third Brigade Deep Security 4 is available at the end of February. The product may be purchased directly from the company or through authorized resellers. For more information, please visit or call 866.684.7332.

Third Brigade will be demonstrating Deep Security 4 at RSA 2006 in San Jose, California, February 14-16th, at the McEnery Convention Center (booth 2136).

About Third Brigade

Third Brigade specializes in providing intrusion prevention systems (IPS) to health care, government, telecommunications, financial services and other organizations that need to prevent attacks that exploit vulnerabilities in commercial and custom software, including web applications. Third Brigade Deep Security gives you greater control of your business. It enables you to create and enforce comprehensive security policies that proactively protect hosts, applications and sensitive data. It also helps ensure compliance with industry and government regulations and corporate policies. And it maximizes the performance of your people, processes and hosts. Unlike other intrusion prevention systems, Third Brigade’s is not intrusive. It has been architected from the ground-up for intrusion prevention, and is smaller, faster and simpler.

For media and analyst briefings or to arrange for an interview, please contact:

Kathryn Schwab

Media and Analyst Relations

Third Brigade

(T) 613-599-4505 x 2238 (NEW)

(M) 613-858-4407


Share article on social media or email:

View article via:

Pdf Print

Contact Author

Kathryn Schwab
Visit website