Attacks/Breaches
4/30/2007
12:15 PM
Connect Directly
RSS
E-Mail
50%
50%

Marshal Offers SP Edition

Integrated email and Internet content security provider is launching a Service Provider Edition of its MailMarshal software

BASINGSTOKE, U.K. -- Integrated email and Internet content security provider, Marshal, is launching a Service Provider Edition of its award-winning MailMarshal software. MailMarshal Service Provider Edition (SPE) provides MSPs and ISPs with a range of hosted email security services that can be tailored to their customers' specific requirements. Services offered include email filtering, policy control, archiving and reporting and the ability to grant differing levels of administration access rights to service providers' customers' own administrators.

MailMarshal SPE is a business-enablement solution for service providers targeting business customers and SOHO users. The software's intuitive, centralised management console makes it easy for MSP/ISP staff to manage policies, user accounts and messages spread across multiple servers located in geographically distributed locations. MailMarshal's Array Manager architecture naturally lends itself to a hosted environment, because it is highly scalable and provides an extremely redundant architecture design for up to 99.999% network availability.

Ed Macnair, CEO of Marshal, comments: "With the launch of MailMarshal SPE, service providers can now offer their customers a hosted version of what is one of the world's top three email content security software products. The beauty of MailMarshal SPE is that it is based on a highly scalable and extremely redundant architecture - both of which are critical to an efficient hosted service - and can be tailored by service providers to meet the exact requirements of their customers, be they SOHO users or larger businesses."

Marshal Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.