Clamp A Lock On Data - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Hardware & Infrastructure
02:07 PM

Clamp A Lock On Data

Startup rolls out line of security blades to protect and monitor server data

Can the digital equivalent of a padlock protect data on a server? Startup 14 South Networks Inc. last week introduced its IntraLock line of IT security blades that plug into a server's PCI interface to become a gatekeeper for data entering or leaving that server.

IntraLock blades are designed primarily to protect IT systems and intranets from internal attacks, although they can be used against external threats. The blades use a combination of hardware and software from Check Point Software Technologies, SurfControl and Symantec to validate that a server should be receiving requests from the user making the request, that the type of traffic attempting to come into the server is consistent with what the server expects, and that the packets coming in don't contain inconsistencies common to worms.

The blades can also protect the rest of the network if an attack is launched from the server it's connected to and keeps server data from being sent to unauthorized recipients. IntraLock blades, available in four models, can also perform VPN termination and stateful packet inspection without using host server resources. The IntraLock blades are priced between $995 and $3,995.

John Dunkle is president of IT analyst firm Workgroup Strategic Services and head of, an automobile-enthusiast Web site that's testing seven IntraLock blades to help secure its database of more than 150,000 subscriber E-mail addresses and user preferences. He likes IntraLock blades because they combine two types of security. "To this point, there hasn't been a technically elegant way of doing this using hardware and software," he says.

"IntraLock offloads the processor, controls who can connect, and what they can do," says Eric Ogren, a senior Yankee Group analyst. "I don't see anyone else offering a security blade like 14 South."

The vendor faces challenges because it's a startup, Dunkle says. "They're offering a unique product, which works for and against them." The company's financial backing from IBM will help, as will its partnership with Check Point.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
Preparing for the Upcoming Quantum Computing Revolution
John Edwards, Technology Journalist & Author,  6/3/2021
How SolarWinds Changed Cybersecurity Leadership's Priorities
Jessica Davis, Senior Editor, Enterprise Apps,  5/26/2021
Register for InformationWeek Newsletters
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll