Risk
3/17/2014
06:51 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Finjan Holdings Subsidiary Files New Patent Infringement Lawsuit Against Sophos

Alleges infringement of Finjan patents relating to endpoint, Web, and network security technologies

FNJN) (the "Company") today announced its subsidiary, Finjan, Inc. (Finjan) has filed a patent infringement lawsuit against Sophos, alleging infringement of Finjan patents relating to endpoint, web, and network security technologies.

The complaint, filed this morning in the U.S. District Court for the Northern District of California, alleges that Sophos' products and services infringe upon six of Finjan's patents. In the complaint, Finjan is seeking undisclosed damages from Sophos.

"Finjan has a broad patent portfolio covering behavior-based intrusion prevention and detection technologies generally deployed across the endpoint, web and networking markets, resulting from years of substantial R&D," commented Finjan's President, Phil Hartstein. "With this new case, we continue down a path of protecting our proprietary inventions from unlicensed companies employing these technologies in direct competition to our existing licensing partners.

This latest action against Sophos reflects that mandate to actively enforce our patent rights, when necessary."

Recognized internationally as a pioneer and leader in web and network security, Finjan's decades-long investment in innovation is captured in its patent portfolio, centered around software and hardware technologies capable of proactively detecting previously unknown and emerging threats on a real-time, behavior-based basis. Finjan has proudly licensed its patents and technology to several major software and technology companies around the world.

For Additional Information: www.finjan.com

ABOUT FINJAN:

Founded in 1997, Finjan is one of the first companies to develop and patent proprietary technology and software that is capable of detecting previously unknown and emerging threats on a real-time, behavior-based basis, in contrast to signature-based methods of intercepting only known threats to computers, which were previously standard in the online security industry. Finjan continues to be a leading online security and technology company, developing and patenting new proprietary technologies related to software that proactively detects malicious code and thereby protects end-users from identity and data theft, spyware, malware, phishing, trojans and other online threats.

Cautionary Note Regarding Forward-Looking Statements:

This press release contains statements, estimates, forecasts and projections with respect to future performance and events, which constitute forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended.

Those statements include statements regarding the intent and belief or current expectations of the Company and its affiliates and subsidiaries and their respective management teams. These statements may be identified by the use of words like "anticipate", "believe", "estimate", "expect", "intend", "may", "plan", "will", "should", "seek" and similar expressions and include any projections or estimates set forth herein. Investors and prospective investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, that actual results may differ materially from those projected in the forward-looking statements.

Important factors that could cause actual results to differ materially from our expectations include, without limitation, those detailed in our filings with the Securities and Exchange Commission ("SEC"). Neither the Company nor any of its affiliates undertakes any obligation to update and forward-looking statements for any reason, even if new information becomes available or other events occur in the future.

The Company will continue to file annual, quarterly and current reports, proxy statements and other information with the SEC. The filings with the SEC will contain important information regarding the Company, its business, financial condition, results of operations and prospects. One should assume that information contained in any of the filings with the SEC is only accurate as of the date specified in such filings. The business, financial condition, results of operations and prospects may have changed materially since any such date. One is advised to carefully review the "Risk Factors" set forth in the Current Report on Form 8-K filed with the SEC on June 3rd, 2013.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-3828
Published: 2014-10-22
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.