Risk
6/6/2007
03:00 AM
50%
50%

Orchestria Launches Software

Orchestria unveiled a comprehensive strategy and new software: Orchestria 5.0

NEW YORK -- Today, Orchestria unveiled a comprehensive strategy and new software – Orchestria 5.0 – for solving the rapidly escalating problem of uncontrolled electronic communications and actions.

The Control-Free Crisis: Two Million Uncontrolled E-mails a Day

Over the last five years the growth in e-mail, instant messaging, Web surfing, Blogging, file uploading and other electronic communications and actions has exploded. It is not unusual for a Global 2000 company to send over two million e-mails a day. At most enterprises, these electronic communications and actions are control-free. The ramifications of this control-free computing environment often have a material, adverse effect on the organization and leave the enterprise exposed to operational, financial, regulatory, legal, employee, and reputation risk. Anyone who has read the front page of The Wall Street Journal or Financial Times over the last month has seen the clear evidence of this.

WITH THE PUSH OF A BUTTON AN A EMPLOYEE CAN:

  • Taint a financial transaction

  • Break a customer relationship

  • Break the law

  • Breach regulatory rules

  • Commit sexual harassment

  • Create a PR nightmare

  • Steal or inadvertently transmit valuable intellectual property

  • Unlawfully disclose personally identifiable information

    Orchestria Corp.

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Cartoon
    Current Issue
    Dark Reading Tech Digest, Dec. 19, 2014
    Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
    Flash Poll
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2009-5027
    Published: 2014-12-26
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-2062. Reason: This candidate is a reservation duplicate of CVE-2010-2062. Notes: All CVE users should reference CVE-2010-2062 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

    CVE-2010-1441
    Published: 2014-12-26
    Multiple heap-based buffer overflows in VideoLAN VLC media player before 1.0.6 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) A/52, (2) DTS, or (3) MPEG Audio decoder.

    CVE-2010-1442
    Published: 2014-12-26
    VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) AVI, (2) ASF, or (3) Matroska (aka MKV) demuxer.

    CVE-2010-1443
    Published: 2014-12-26
    The parse_track_node function in modules/demux/playlist/xspf.c in the XSPF playlist parser in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty location element in an XML Shareable Playlist Format...

    CVE-2010-1444
    Published: 2014-12-26
    The ZIP archive decompressor in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted archive.

    Best of the Web
    Dark Reading Radio
    Archived Dark Reading Radio
    Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.