Attacks/Breaches
7/9/2012
03:11 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Total Defense Acquires Cloud Security Company

Acquires iSheriff

Redwood Shores, Calif., July 9, 2012 – Total Defense, Inc., the leading provider of solutions to combat the growing threat of cybercrime, today announced the company has acquired iSheriff, a pioneering leader in cloud security solutions. Together, the companies will offer the most robust cloud security solutions on the market.

“The days of employees safely accessing the internet from behind a corporate firewall are increasingly history for modern businesses. Today’s workforce is increasingly mobile, connecting through a broad array of devices and adopting cloud services at an accelerating pace. This reality requires a new approach to security,” said Paul Lipman, CEO at Total Defense. “A truly effective security solution requires a multi-layered approach. The cloud enables companies to very easily scale and deploy a powerful additional layer of security that is specifically tailored to today’s ‘de-perimeterized’ environments. As the security industry transitions, our acquisition of iSheriff puts us at the forefront of Internet security firms, by providing customers solid, best of breed, integrated security that’s managed through the cloud. We are thrilled to have the opportunity to truly make an impact and change the dynamic of the security market,” added Lipman.

Recently, Total Defense announced its first cloud product, Total Defense Cloud Security, an integrated cloud based SaaS (Security as a Service) solution for Web and email protection. The new offering provides a powerful and versatile Web and email security platform that protects users anytime and anywhere. This game changing solution provides a comprehensive additional layer of security that enhances the company’s existing endpoint solutions, giving Total Defense the advantage of a global cloud for real time malware protection across multiple platforms.

Oscar Marquez, CEO & Director of the Board of iSheriff, commented, “I have shared a vision for transforming the way businesses consume internet security with Paul Lipman for some time. Becoming part of Total Defense creates an ideal synergy. Total Defense’s large base of customers and extensive network of global partners will quickly accelerate the growth of our cloud offerings giving Total Defense a multi-tenant solution to provision and manage their customers, partners and OEM providers. This coupled with our global cloud infrastructure and cloud security expertise and Total Defense’s complete line of internet security solutions make a formidable company even stronger.”

For more information about Total Defense and its products, please visit: www.totaldefense.com.

###

About Total Defense

Total Defense, the leading provider of solutions to combat the growing threat of cybercrime, protects over 40,000 businesses and over 4 million consumers from the growing epidemic of cybercrime and malware. We provide multiple layers of digital security through desktop, mobile device, web gateway and cloud based solutions. We go “beyond protection” by ensuring our customers receive the level of service and support they require in an ever changing threat landscape. Total Defense is a former business of CA Technologies, one of the largest information technology companies in the world. Our major centers of operation are in New York, Silicon Valley, India, and Europe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.