Retriever is tailor-made for LAN administrators

Retriever is tailor-made for LAN administrators

Security software locates network-level vulnerabilities and delivers procedural recommendations

By Richard W. Walker

GCN Staff

Attention LAN administrators: This one's just for you.

Retriever 1.0, network-level security vulnerability software from L-3 Network Security of Denver, is designed, said company officials, to be part of a LAN manager's daily routine.

'We saw a need for a product that wasn't used by [security] specialists,' said Cress Carter, president of L-3 Network Security.

In addition to identifying critical network vulnerabilities, Retriever gives LAN and systems managers clear recommendations for security best practices.

Company officials surveyed LAN administrators to find out what they wanted in a vulnerability management product. What they discovered, Carter said, was that LAN administrators wanted a product that will not harm the network, is easy to use and is affordable.

'They wanted to get it, load the CD-ROM and be using it in an hour,' Carter said.

For security to be effective, said Greg Adams, L-3 Network Security's vice president of technology, it must be integrated into day-to-day network operations.

Using proprietary, nonintrusive methods, Retriever provides a list of vulnerabilities associated with all network components and systems. The software's databases contain more than 750 computer vulnerabilities, which are regularly updated by the company's research team.

Once LAN managers have a vulnerability profile of their network, they can select and enforce security practices drawn from Retriever's database of about 2,000 technical and policy safeguards, company officials said.

Administrators also can schedule regular vulnerability audits, which identify new systems, missing systems, changes in services and new vulnerabilities.

Retriever's drawing canvas lets users model the vulnerability levels of new networks, network additions or partner networks.

L-3 Network Security has priced Retriever at $500 per Class C address, including database updates, Web technical support and the most current version of the software.


  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

  • Marines on patrol (US Marines)

    Using AVs to tell friend from foe

    The Defense Advanced Research Projects Agency is looking for ways autonomous vehicles can make it easier for commanders to detect and track threats among civilians in complex urban environments without escalating tensions.

Stay Connected