Risk
7/31/2006
07:56 AM
Connect Directly
RSS
E-Mail
50%
50%

CoveLight Detects Fraud

Covelight Systems announced the availability of Covelight Percept 3.0

CARY, N.C. -- Covelight Systems, an innovator of solutions for real-time online fraud protection, today announced the availability of Covelight Percept™ 3.0. Percept is the industry’s first and only fraud monitoring product line that combines real-time traffic capture, identity-based fraud detection, analytics, forensics and reporting for a completely transparent solution to manage online fraud while not interfering with the application performance or the user experience.

“We’re very excited about this new offering,” said Spencer Snedecor, Covelight’s CEO. “Percept is already protecting online banking and brokerage applications at numerous financial institutions representing a combined $1.5 trillion in assets. This latest version will continue delivering value to our customers and strengthens Covelight’s technology leadership position in online fraud management.”

With the December 2006 FFIEC deadline looming, financial services institutions can quickly and painlessly deploy Percept to exceed the recommended guidance while protecting their reputations and online users from fraud, including man-in-the-middle and man-in-the-browser attacks. As evidenced by a recent well-publicized incident at Citibank, these new attacks are part of an emerging session hijacking trend designed to circumvent improved authentication controls. Additionally, Percept 3.0 can run in combination with any multi-factor authentication solution to invoke strong authentication only when needed, so the end user is not unnecessarily aggravated with burdensome challenges.

Covelight Systems Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.