View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
January 3, 2005

Fort Hood selects Intrusion to secure world’s largest US army post

Intrusion has been selected by the US Army Directorate of Information Management, located at Fort Hood, for the deployment of the SecureNet intrusion detection/prevention system and SpySnare spyware prevention system. Intrusion received an order for around $800,000 for the first phase of the project, which was shipped last December.

By CBR Staff Writer

Intrusion’s SecureNet system detects and blocks unauthorized network intrusions. The Ft. Hood SecureNet installation addresses the common insider threat behind the site’s perimeter firewall where many of the greatest potential vulnerabilities exist.

SecureNet sensors will be deployed lower into the site’s network, at the department level, thus increaseing threat visibility across the full Ft. Hood network.

We’re taking a proactive stance to make ourselves better and more relevant in our information warfare and cyber security mission, explained Lieutenant Colonel Ed Morris, director of the Ft. Hood Directorate of Information Management (DOIM).

With the SecureNet deployment at Ft. Hood, we are able to get specific details about whom we’re fighting and from where they came. Once we get the enemy in our sights, we’re able to take aim and eliminate the offender, Lieutenant Colonel Ed Morris added.

Intrusion’s SpySnare spyware prevention system was also chosen by Ft. Hood for deployment at the site’s network perimeter. SpySnare detects and blocks in-bound and out-bound spyware infections and unauthorized peer-to-peer (p2p) communications, a common source of spyware infections, at the Ft. Hood site.

Most spyware programs are independent executable files that take on the authorization abilities of the victim’s computer. They include auto-install and auto-update capabilities and can report on any attempts to remove or modify them.

Intrusion SpySnare prevents spyware programs from being inserted on customer computers by blocking them at the customer’s perimeter. It utilizes Intrusion’s network analysis engine to determine if spyware signatures are attempting to get into the customer’s network.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Fort Hood is additionally implementing Intrusion’s Security Status Review (SSR) program. Co-developed with the US Army, SSR leverages Intrusion’s SecureNet Provider forensics and real-time display tools to enable DOIM IA staff to proactively document important security trends, helping DOIM leadership to make IT policy and procedure decisions.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU