Application traffic control now reaches network's edge

Xirrus plans to sell next month the option of adding application traffic control to XR Wireless Arrays, becoming one of the first vendors to integrate such a feature into an access point at the edge of the network.

Application Control, introduced this week, provides an alternative to have a traffic classification and policy enforcement engine in a gateway node or appliance located in the data center. Xirrus, which competes with Cisco, Aruba, Hewlett-Packard and Motorola, is one of the first to head to the network perimeter, Tim Zimmerman, an analyst with Gartner, said.

"We expect to see this moving forward, because it is an important next step in the development of networks," he said. Such architectures avoid the latency and performance problems that arise when application traffic is controlled in the data center.

In general, Application Control makes it possible for customers to mark critical applications, so they get priority in accessing a network. Bandwidth-heavy applications can be restricted and specific applications blocked.

This kind of control is useful in many different environments, such as in hospitals, where there's a need to prioritize critical applications, and in schools, where social media and other non-educational services can be blocked or restricted.

Xirrus's new product cannot identify malware traffic or prevent sensitive data from leaving a corporate network. However, the technology can determine if the traffic is traveling over a Secure Socket Layer (SSL).

[Derek Slater: Network Security Isolationism must die]

Overall, Application Control is meant to help corporations make the best use of bandwidth to avoid unnecessary upgrades or hardware purchases, said Steven Wastie, chief marketing officer for Xirrus.

"Prioritizing the critical applications, as opposed to the recreational stuff, can result in a much more effective use of the network," he said.

The need to prioritize applications accessing a network through a tablet, smartphone or laptop crosses all industries, Zimmerman said. "There's a lot of prioritization that can be done here that network administrators, based on the vertical market, would really like to do."

The new product will be sold as an addition to XR Wireless Arrays, starting in December. Pricing has not been disclosed.

Wireless Arrays integrate 2 to 16 radios, a multi-gigabit switch, controller, firewall, threat sensor and spectrum analyzer in a single device. Xirrus pitches the product as a less expensive alternative to having multiple access points that require more cabling, switching and general infrastructure.

Read more about network security in CSOonline's Network Security section.

Join the CSO newsletter!

Error: Please check your email address.

Tags Motorolaapplication controlapplicationsXirrussecurityData Protection | Network Securitysoftwaredata protectionHewlett-PackardGartner

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts