Risk
11/15/2006
07:45 AM
Connect Directly
RSS
E-Mail
50%
50%

AGF Chooses Promisec

France-based AGF selected the Promisec Spectator Professional to provide powerful enforcement of internal security policy

NEW YORK -- Promisec, Ltd., a leading provider of clientless endpoint security management (CESM) technology, today announced that France-based AGF, a leading insurance and financial services provider in more than 20 countries, and part of the Allianz Group, selected its flagship product, Promisec Spectator Professional, to provide powerful enforcement of internal security policy.

AGF will employ Promisec Spectator Professional to protect its 14,000 endpoints, providing clientless endpoint security management that arms IT managers with a centralized method to detect, prevent and repair irregularities originating from within the network’s workstations and servers.

“Compliance is important for us, particularly with respect to the processes that conform to the Sarbanes-Oxley (SOX) standard. With that in sight, we were looking for a comprehensive solution which efficiently detects all kind of threats on our workstations, particularly the ones circumventing our gateway solutions” says David Horvat, Manager of Information Systems at AGF. “During the tests we were impressed by the performance of Spectator Professional which enables us to be constantly informed on the violations of our security policies and to repair them. The solution’s agentless aspect was decisive in our choice because of the extreme ease of implementation and its security added value. Spectator Professional will contribute to the increased security level of our end-points and to the enforcement of our security policies”. concluded Sylvère Leger, responsible for Information Security Systems.

“We are pleased to add AGF to our customer base”. said Amir Kotler, CEO of Promisec. “The tremendous size of AGF, as well as it being a major player in the French financial sector strengthens Promisec’s strategy to offer its solutions to huge financial enterprises across the world. We are proud that such a well-known organization in France shares our security approach and has selected our solutions to secure their endpoints. We look forward to the addition of further organizations to our customer-base soon.”

Promisec Ltd.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.