Application traffic control now reaches network's edge

Xirrus plans to sell next month the option of adding application traffic control to XR Wireless Arrays, becoming one of the first vendors to integrate such a feature into an access point at the edge of the network.

Application Control, introduced this week, provides an alternative to have a traffic classification and policy enforcement engine in a gateway node or appliance located in the data center. Xirrus, which competes with Cisco, Aruba, Hewlett-Packard and Motorola, is one of the first to head to the network perimeter, Tim Zimmerman, an analyst with Gartner, said.

"We expect to see this moving forward, because it is an important next step in the development of networks," he said. Such architectures avoid the latency and performance problems that arise when application traffic is controlled in the data center.

In general, Application Control makes it possible for customers to mark critical applications, so they get priority in accessing a network. Bandwidth-heavy applications can be restricted and specific applications blocked.

This kind of control is useful in many different environments, such as in hospitals, where there's a need to prioritize critical applications, and in schools, where social media and other non-educational services can be blocked or restricted.

Xirrus's new product cannot identify malware traffic or prevent sensitive data from leaving a corporate network. However, the technology can determine if the traffic is traveling over a Secure Socket Layer (SSL).

[Derek Slater: Network Security Isolationism must die]

Overall, Application Control is meant to help corporations make the best use of bandwidth to avoid unnecessary upgrades or hardware purchases, said Steven Wastie, chief marketing officer for Xirrus.

"Prioritizing the critical applications, as opposed to the recreational stuff, can result in a much more effective use of the network," he said.

The need to prioritize applications accessing a network through a tablet, smartphone or laptop crosses all industries, Zimmerman said. "There's a lot of prioritization that can be done here that network administrators, based on the vertical market, would really like to do."

The new product will be sold as an addition to XR Wireless Arrays, starting in December. Pricing has not been disclosed.

Wireless Arrays integrate 2 to 16 radios, a multi-gigabit switch, controller, firewall, threat sensor and spectrum analyzer in a single device. Xirrus pitches the product as a less expensive alternative to having multiple access points that require more cabling, switching and general infrastructure.

Read more about network security in CSOonline's Network Security section.

Tags: application control, Motorola, applications, security, Xirrus, software, Data Protection | Network Security, data protection, Hewlett-Packard, Gartner

Microsoft confirms HTTP Strict Transport Security for IE 12

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Web Security and Control

Protect your users on the web

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.