Security suppliers form real-time defence

Leading managed security service providers are to share detailed network attack profiles through the Fingerprint Sharing...

Leading managed security service providers are to share detailed network attack profiles through the Fingerprint Sharing Alliance.

The Fingerprint Sharing Alliance marks the first time that companies can share detailed attack information in real-time and block attacks closer to the source. The global alliance marks a significant step forward in the fight against internet attacks and major infrastructure threats that cross network boundaries, continents and oceans.

Lost revenue and repair costs from attacks on networked services and disruptions in 2005 are expected to exceed $17.5bn (£9.3bn), up from $13.2bn in 2003, according to Computer Economics.

Supporting the alliance is a wide range of network operators and providers, including Asia Netcom, British Telecom, Broadwing, Cisco, Energis, EarthLink, MCI, Merit Network, the Planet and Rackspace.

Dave Harcourt, head of network security at BT Wholesale, said, “Providers like BT spend a lot of time and resources protecting the integrity and availability of their networks to deliver the services our customers expect of us.

“The Fingerprint Sharing Alliance is a great complement to this because it enables providers to quickly share information on attacks across global networks. This is very empowering to any service provider because it facilitates a community for providers to get at the source of attack traffic and minimise the impact it has on everyone's networks and services.”

Ben Bradberry, vice-president of Information Security at US managed hosting provider the Planet, said: “We are very committed to delivering the most reliable and secure managed hosting services. The Fingerprinting Alliance allows us to quickly share important details about an attack.

“The service helps us optimise bandwidth and maximise quality of service for our customers by providing us with the critical information required to accurately filter attack traffic near the ingress points, stopping attacks closer to the source.”

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.