Risk
12/5/2012
04:24 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Critical Watch Announces Interoperability With HP Enterprise Security Products As Participants In HP's Partner Program

Collaboration will enhance interoperability between Critical Watch ACI Recommendation Engine and HP Fortify

DALLAS, Texas – December 04, 2012 – Critical Watch, the innovator of Active Countermeasure Intelligence (ACI), today announced its participation in the HP® Enterprise Security partner program, supporting interoperability with HP technologies to create a more secure business environment for today's enterprise. This collaboration will enhance interoperability between the Critical Watch ACI Recommendation Engine&trade and HP Fortify.

This intelligence is continuously being advanced by the Critical Watch&trade Basecamp Labs&trade research team, which builds custom expressions to add contextual data to incidents generated by risk detection technologies so these intelligent countermeasure recommendations can be made.

"Our interoperability with HP Fortify will greatly enhance the delivery of our ACI Platform," said Audian Paxson, director of product management at Critical Watch. "This reflects our commitment to working with today's industry leaders in improving enterprise security."

A recent report by the 451 Group highlights the capabilities of the ACI Platform&trade that will support offerings from HP and benefit mutual customers: "A vulnerability may exist in the Web layer, but the most appropriate countermeasures may exist within the network layer or in the data layer. Knowing how disparate different support teams can be within some organizations, this adds a degree of cohesiveness to overall operations that has generally been lacking. This intelligence can lead to better risk decisions, and as a result the value lies in an increased ability to orchestrate the security process from detection through to mitigation."

Finding and understanding system vulnerabilities is just the first step in countering threats, as customers need critical information about which vulnerabilities should be fixed," said Michael Callahan, vice president, product solutions marketing, HP Enterprise Security Products. "The interoperability with Critical Watch allows us to provide the security intelligence necessary to make the right risk decisions about today's threats."

About ACI Platform&trade

The ACI Platform&trade is the first technology that combines risk data from a variety of sources throughout the data stack and recommends and initiates security countermeasures to mitigate those risks. It complements existing security intelligence gathering solutions to provide a complete picture of risk-correlated countermeasures.

About Critical Watch&trade

Critical Watch is the innovator of ACI Platform&trade – a next generation information security technology that combines comprehensive risk intelligence with active mitigation. Critical Watch clients are Global 2000 enterprises across verticals such as healthcare, financial services, state and local government, ecommerce, and manufacturing.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.