送交者: 火格Meshfire 于 2005-3-25, 22:26:51:
回答: MeshFire is a Grid Server to Provide Security Policy and Event Log Services 由 火格Meshfire 于 2005-3-24, 14:54:41:
Universal Grid Server to Provide Security Policy & Event Log Services
MeshFire is the world's first grid server to provide plug-and-play security policy and event log services, to enable easy and intelligent operations of security, auditing, access control and monitoring of your entire diversified heterogeneous applications and services. Meshfire provides XML open formats for storage and messaging, and thus easy integration with any existing security components, such as identidy authentication, access control authorization, LDAP, Radius, AD (Active Directory), UDDI, IPS, VPN, firewalls, application gateways, etc.
One Server for Diversified Applications in Heterogeneous Environment
Most other application security vendors provide single-node-based products, whereas MeshFire grid server offers a large-scale distributed server that securely connects, monitors, audits and controls thousands of Web servers in open XML standards. The appliance uses high-performance purpose-built dedicated hardware to implement massive multithreading servers for Web application security enforcement, audit, and policy control. The grid capability makes MeshFire stand out from competitors in securing the entire e-business Web environments, since there exists a big jump from a software tool to MeshFire's grid-based large-scale distributed MeshOS and grid server. The sophisticated skills and large development efforts in massive multithreading technology have built a high barrier to entry.
Value Proposition, Benefits, Advantages
MeshFire grid server can see what each point-based product cannot see. MeshFire XML-based open standards enable easy plug-and-play of heterogeneous applications and devices, and thus relieve IT administrators from headaches in securing hundreds or thousands of different Web servers, application servers, applications and services. With such a pain-killer appliance, IT administrators can focus on core e-business values, instead of drowning in large number of configuration files, policy rules, frequent changes/updates, vulnerability scan results, hacker intrusion and attacks, worm outbreaks, false alarms, ocean of event logs, etc.