Operations

9/10/2018
11:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

RedSeal Launches Remote Administrator Managed Service to Augment Customers' Security Teams

SUNNYVALE, Calif., Sept. 10, 2018 (GLOBE NEWSWIRE) -- RedSeal, the leader in network modeling and cyber risk scoring, today introduced RedSeal Remote Administrator, a new managed service to augment customers’ security teams, make network situational awareness more widely available, and help customers increase their digital resilience.
Most enterprises have dozens of disparate security products in their environment, each requiring administration and maintenance. At the same time, they face a cybersecurity skills gap: there are not enough qualified people to operate even the products they have.
RedSeal Remote Administrator addresses these issues by becoming an essential part of an organization’s security team.  As part of the service, a dedicated network security engineer will maintain and administer RedSeal’s network modeling and risk scoring platform. Customers will always have a single, up-to-date model of all their network environments – including public cloud, private cloud and physical assets – to validate their security, accelerate their investigation, and improve their productivity.
Specifically, RedSeal will provide Remote Administrator customers with the necessary resources to maintain their deployment, keeping it current and in exceptional working order. This includes a daily cadence of reviewing the network model, ensuring that data collection tasks are working, maintaining the topology map to see that new devices are properly placed, providing scheduled reports, and making certain that the platform is performing as expected.
“Security practitioners need to understand how everything is connected in their networks in order to defend them.  It’s essential for our customers to have an updated and working model so they can continuously improve their security,” said Kurt Van Etten, chief product officer at RedSeal.  “RedSeal Remote Administrator augments an organization’s security team to continuously deliver an accurate model.  The service allows customers to benefit from RedSeal situational awareness—without the need for additional headcount or in-house expertise. They can quickly get the information they need.”
Organizations simply need network access (VPN and Jumpbox) to get started with RedSeal Remote Administrator. The service is available internationally and RedSeal Remote Administrator representatives are on call Monday to Friday during U.S. business hours.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19296
PUBLISHED: 2018-11-16
PHPMailer before 5.2.27 and 6.x before 6.0.6 is vulnerable to an object injection attack.
CVE-2018-19301
PUBLISHED: 2018-11-15
tp4a TELEPORT 3.1.0 allows XSS via the login page because a crafted username is mishandled when an administrator later views the system log.
CVE-2018-5407
PUBLISHED: 2018-11-15
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
CVE-2018-14934
PUBLISHED: 2018-11-15
The Bluetooth subsystem on Polycom Trio devices with software before 5.5.4 has Incorrect Access Control. An attacker can connect without authentication and subsequently record audio from the device microphone.
CVE-2018-14935
PUBLISHED: 2018-11-15
The Web administration console on Polycom Trio devices with software before 5.5.4 has XSS.