Typically deployed to protect applications against hacking or worms, TippingPoint’s UnityOne appliances are in-line devices that use a variety of methods to identify incoming traffic that looks like it may exploit security vulnerabilities.

The appliances now also protect vulnerabilities in firewalls and routers, the company announced. Many customers are deploying our appliances outside the firewall already, said TippingPoint chief technology officer Marc Willebeek-LeMair.

Alongside the existing attack pattern recognition filters, TippingPoint’s UnityOne products now also have traffic anomaly detection algorithms, which can sense unusual patterns of behavior in traffic volumes to specified sources or ports.

Willebeek-LeMair added UnityOne policies can now be written to also rate-shape, or throttle back, undesirable or suspicious traffic, helping to defend against denial of service attacks or peer-to-peer bandwidth hogs. Previous versions could simply block or allow.

The company will also today announce that its devices will protect against vulnerabilities in voice over IP applications, some of which were recently discovered to have insecure implementations of the H.323 protocol, Willebeek-LeMair said.

This article is based on material originally published by ComputerWire