Click here to close now.

SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Blue Box Blog, Lori MacVittie, Plutora Blog

News Feed Item

ADARA Networks Thwarts Heartbleed

All ADARA Platforms utilizing OpenSSL are equipped with multiple mechanisms against vulnerabilities

SAN JOSE, Calif., April 11, 2014 /PRNewswire/ --  ADARA Networks®, the leading provider of advanced computing and networking products, announced today that its customers are protected against the OpenSSL "Heartbleed" vulnerability (CVE-2014-0160) identified by the United States Computer Emergency Readiness Team (US-CERT) and documented in Alert TA14-098A on April 8, 2014. The company made the announcement to more widely inform the company's customers and also to respond to inquiries from customers of legacy networking and security product companies that have a vulnerability to Heartbleed. 

ADARA Networks logo.

"ADARA's invulnerability to Heartbleed stems from our architecture which multiply encrypts and authentication that extend to each and every single packet," said Dr.  Marcelo Spohn, CTO, ADARA. "This eliminates the potential for an exploit of ADARA based upon the Heartbleed vulnerability. Simply put, it is not possible for an attacker to masquerade as an ADARA peer router, switch or any ADARA-networked product."

ADARA is uniquely able to eliminate the risk of Heartbleed exploits for Internet-based services and web applications which are at high risk from this exploit. 

All ADARA platforms implementing SSL, including Layer 2, 3 products (switching, routing) and Layer 4-7 products, such as Firewalls, IDS/IPS, WAN Optimization, WAN Acceleration, Global and Local Load Balancing, Web Services, VPN, and SSL termination, as well as all ADARA Software Defined Networking products provide protection against Heartbleed and other exploits. ADARA platforms and products use multi-factor authentication and dynamic multi-factor encryption. These and other security measures also dynamically cycle using a variable time frame, capable of sub-microsecond changes, using intelligence available only in ADARA platforms.

ADARA will announce the ADARA Secure Environments Customer Program on Monday, April 14, 2014 to further bolster the industry against Heartbleed. The program is designed to enable companies to immediately eliminate the vulnerability from their infrastructure, services and operations. ADARA will also provide more details on the unique security features in ADARA platforms that prevent ADARA-protected infrastructure from Heartbleed and other vulnerabilities.

About ADARA Networks
ADARA Networks is the industry leader in Software Defined Networking, Virtual Computing, and Networking.  ADARA SDN is an entire Physical + Virtual (P+V) ecosystem; End-to-End, (Data Center, Network, Small Office, Home and Mobile User), Production-ready, for Service Providers and Enterprises of all sizes, and verticals. ADARA SDN seamlessly works with any and all 3rd party SDN and legacy products. ADARA SDN empowers customers to simultaneously and optimally financially engineer their profits while operationally managing their enterprise.  ADARA SDN delivers autonomic, dynamic management of services, virtual, and physical infrastructure management.  ADARA SDN enables customer to create any policies, ADARA SDN dynamically creates and enforces rules and configurations, and enforces Service Level Agreement (SLA) performance.  For more information, please visit: http://www.adaranetworks.com.

Media Contact:
Kevin Cheng
Sparkpr for ADARA Networks
[email protected]
+1 415.321.1879

Logo - http://photos.prnewswire.com/prnh/20140303/SF75157LOGO

SOURCE ADARA Networks

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides private all-in-one social intranets allowing workers to securely collaborate from anywhere in the world and from any device. Social, mobile, and eas...
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on T...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a...
Database apps on mobile devices shouldn't stop working when there's limited or no network connectivity. In his session at 16th Cloud Expo, Bradley Holt, a Developer Advocate for IBM Cloudant, will discuss how to bring data stored in a cloud database to the edge of the network (and back again), whenever an Internet connection is available. He will demonstrate techniques for replicating cloud databases with mobile devices in order to build offline-enabled mobile apps that can provide a better,...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover ...
SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Ras...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
This talk focuses on the application of DevOps fundamentals to include network infrastructure. It draws from real deployment case studies on the extension of today's paradigms to address the challenges of the network infrastructures' ability to seamlessly and cohesively integrate into agile workflows. In this session at DevOps Summit, Arista Networks will focus on configuration management using automation with a nod to future work necessary to include telemetry and ephemeral state information....
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
Chuck Piluso will present a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Speaker Bio: Prior to Data Storage Corporation (DSC), Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of ...