Risk

6/6/2007
03:00 AM
50%
50%

Orchestria Launches Software

Orchestria unveiled a comprehensive strategy and new software: Orchestria 5.0

NEW YORK -- Today, Orchestria unveiled a comprehensive strategy and new software – Orchestria 5.0 – for solving the rapidly escalating problem of uncontrolled electronic communications and actions.

The Control-Free Crisis: Two Million Uncontrolled E-mails a Day

Over the last five years the growth in e-mail, instant messaging, Web surfing, Blogging, file uploading and other electronic communications and actions has exploded. It is not unusual for a Global 2000 company to send over two million e-mails a day. At most enterprises, these electronic communications and actions are control-free. The ramifications of this control-free computing environment often have a material, adverse effect on the organization and leave the enterprise exposed to operational, financial, regulatory, legal, employee, and reputation risk. Anyone who has read the front page of The Wall Street Journal or Financial Times over the last month has seen the clear evidence of this.

WITH THE PUSH OF A BUTTON AN A EMPLOYEE CAN:

  • Taint a financial transaction

  • Break a customer relationship

  • Break the law

  • Breach regulatory rules

  • Commit sexual harassment

  • Create a PR nightmare

  • Steal or inadvertently transmit valuable intellectual property

  • Unlawfully disclose personally identifiable information

    Orchestria Corp.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Want Your Daughter to Succeed in Cyber? Call Her John
    John De Santis, CEO, HyTrust,  5/16/2018
    Don't Roll the Dice When Prioritizing Vulnerability Fixes
    Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
    New Mexico Man Sentenced on DDoS, Gun Charges
    Dark Reading Staff 5/18/2018
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: "Security through obscurity"
    Current Issue
    Flash Poll
    [Strategic Security Report] Navigating the Threat Intelligence Maze
    [Strategic Security Report] Navigating the Threat Intelligence Maze
    Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2018-7268
    PUBLISHED: 2018-05-21
    MagniComp SysInfo before 10-H81, as shipped with BMC BladeLogic Automation and other products, contains an information exposure vulnerability in which a local unprivileged user is able to read any root (uid 0) owned file on the system, regardless of the file permissions. Confidential information suc...
    CVE-2018-11092
    PUBLISHED: 2018-05-21
    An issue was discovered in the Admin Notes plugin 1.1 for MyBB. CSRF allows an attacker to remotely delete all admin notes via an admin/index.php?empty=table (aka Clear Table) action.
    CVE-2018-11096
    PUBLISHED: 2018-05-21
    Horse Market Sell & Rent Portal Script 1.5.7 has a CSRF vulnerability through which an attacker can change all of the target's account information remotely.
    CVE-2018-11320
    PUBLISHED: 2018-05-21
    In Octopus Deploy 2018.4.4 through 2018.5.1, Octopus variables that are sourced from the target do not have sensitive values obfuscated in the deployment logs.
    CVE-2018-8142
    PUBLISHED: 2018-05-21
    A security feature bypass exists when Windows incorrectly validates kernel driver signatures, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1035.