Entercept blocks hackers, doesn't log their actions

Entercept blocks hackers, doesn't log their actions

By William Jackson

GCN Staff

ClickNet Software Corp.'s intrusion prevention software for servers and desktop systems claims to recognize and refuse unauthorized requests to the operating system, stopping trouble before it starts.

The software product, Entercept, marks the San Jose, Calif., company's entry into the security arena, said Vince Rossi, vice president of business development.

Entercept, for use by systems administrators with little security expertise, differs from intrusion detection products by blocking hackers rather than logging their actions. It has a database of about 200 signatures of intrusion methods which the company will update much like antivirus software definitions.

The work that made possible what ClickNet calls pre-process evaluation was done by CoreKT Technologies, a company acquired this year by ClickNet.

'The hard part was getting in front of the operating system,'' Rossi said.

Entercept's management console runs under Microsoft Windows NT 4.0. Client agents are available for NT 4.0 Workstation and Server, and for SunSoft Solaris 2.51, 2.6 and 2.7. The management console handles policy definition, incident reporting and distribution of agent updates.

Distributed host agents observe all requests to the operating system and compare them with known intrusion signatures. When an intrusion attempt is observed, the agent disallows the request or terminates the connection, and either logs the incident or ignores it depending on the security policy. Administrators can be notified of incidents. The agent records the intrusion process used so that hidden Trojan horses can be located and removed.

Entercept comes with a default security policy enabled out of the box.

Contact ClickNet at 800-599-3200.


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/Shutterstock.com)

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected