Attacks/Breaches
8/31/2007
04:51 AM
50%
50%

Bimba Deploys Sidewinder

Secure Computing announced that Bimba Manufacturing has switched to the Sidewinder Network Gateway Security appliance

SAN JOSE, Calif. -- Secure Computing Corporation (NASDAQ: SCUR), a leading enterprise gateway security company, today announced that Bimba Manufacturing has switched from a competitor's firewall to the Sidewinder® Network Gateway Security appliance. Bimba's previous firewall did not protect the Illinois-based manufacturer from all malware threats—particularly viruses in encrypted e-mail messages. However, the Sidewinder appliance, with its unique reputation-based security, blocks viruses and other threats whether they are encrypted or not, in both incoming and outgoing traffic.

"Our testing showed us that viruses in encrypted e-mails were able to get past our former security products," recounted Matt Nantais, systems administrator at Bimba Manufacturing. "We conducted the same tests using the Secure Computing solution, and it prevented all of the malware from getting to the network."

The Sidewinder appliance is the first and only enterprise firewall to integrate reputation-based security technology, putting it well ahead of offerings by other large security and networking companies. With industry-leading global intelligence from TrustedSource™ customers receive real-time behavior monitoring of URLs, domains, IPs, message content and images. The resulting reputation score enables proactive blocking of the majority of spam, spyware, viruses, zombies, and Trojans at the gateway—well before they ever gain access to a network. "Thanks to TrustedSource, Sidewinder customers are dropping up to 92 percent of spam with no additional CPU overhead," noted Scott Montgomery, vice president of product management at Secure Computing. "That saves significant bandwidth and improves overall network performance."

Secure Computing Corp. (Nasdaq: SCUR)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2808
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a rel...

CVE-2014-9713
Published: 2015-04-01
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.

CVE-2015-0259
Published: 2015-04-01
OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage.

CVE-2015-0800
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2...

CVE-2015-0801
Published: 2015-04-01
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.