Risk
11/5/2012
05:34 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Lumension Announces The Completed Acquisition Of CoreTrace Corporation

Acquisition strengthens Lumension's software capabilities, patent/IP portfolio

SCOTTSDALE, Ariz., Nov. 5, 2012 /PRNewswire/ -- Lumension, a global leader in endpoint management and security, today announced the completed asset acquisition of CoreTrace Corporation, an innovative application control software provider. Austin-based CoreTrace delivers solutions that prevent the execution of malware and unknown executables. The acquisition will enhance Lumension's application control feature set, grow its software and patent/IP portfolio and extend Lumension's growing customer, OEM and reseller bases.

The rise of advanced persistent attacks and weaponized malware has resulted in a new generation of widely distributed malware. In upcoming State of the Endpoint Lumension-sponsored research to be released in early December, researchers identified growing alarm among IT security professionals related to advanced persistent threats (APTs). Understanding this new threat environment, Lumension has strengthened its leadership position in the endpoint management and security space by acquiring the assets of CoreTrace Corporation, and further consolidating market share in the application control space.

"The threat of advanced persistent attacks is growing at a significant rate,"

said Pat Clawson, Chairman and CEO of Lumension. "Look at oil operators in the middle east who have suffered devastating cyber attacks. With this rise in advanced persistent threats, and weaponized malware, along with the fact that Gartner projects[i] that 'by 2015, more than 50% of enterprises will have instituted 'default deny' policies' that restrict the applications users can install,' Lumension felt a strategic acquisition of CoreTrace would further equip both current and prospective customers in the ever-evolving threat landscape and cement Lumension's leadership in next generation technologies. We are thrilled to have CoreTrace on board to continue our drive to advanced, persistent protection for organizations of all sizes."

With the acquisition of CoreTrace assets, Lumension will add more than 130 customers, key development staff, and additional OEM and reseller partners.

Key Facts:

-- Lumension acquires key IP and patent portfolio from CoreTrace.

-- Lumension will likely integrate key aspects of CoreTrace's technology

into Lumension® Application Control and continue to offer Lumension

Application Control through the Lumension Endpoint Management Security

Suite.

-- Lumension will continue to provide technical and support services to

CoreTrace's current application control commercial customers.

-- Lumension will provide existing CoreTrace customers with a seamless

upgrade path to Lumension's endpoint management platform once key

features of the CoreTrace technology are integrated.

-- Lumension will likely continue to offer the CoreTrace Bouncer® product

through existing commercial sales channels.

A financial analyst briefing will be held at 11:30 a.m. EST on Wednesday, Nov.

7. RSVP is required; please contact Kim Doyle at kim.doyle@lumension.com or

480-444-1229 for dial-in instructions.

Additional Acquisition Resources:

-- www.lumension.com/coretrace

Supporting Resources:

-- Optimal Security Blog

-- Lumension on Twitter

About Lumension

Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Texas, Florida, Ireland, Luxembourg, the United Kingdom, Australia and Singapore. Lumension: IT Secured. Success

Optimized.(TM) More information can be found at www.lumension.com.

About CoreTrace

CoreTrace provides the most advanced threat protection for physical and virtual Windows servers, desktops and laptops, as well as Linux enterprise servers. The Company's flagship solution, CoreTrace Bouncer®, protects customers' most valuable intellectual property and systems by preventing the most advanced threats. Bouncer's advanced threat protection is based upon adaptive application whitelisting to prevent the execution of all unauthorized code, memory protection to stop attackers from exploiting whitelisted applications and risk-profiling of all applications via cloud-based reputation services.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4725
Published: 2014-07-27
The MailPoet Newsletters (wysija-newsletters) plugin before 2.6.7 for WordPress allows remote attackers to bypass authentication and execute arbitrary PHP code by uploading a crafted theme using wp-admin/admin-post.php and accessing the theme in wp-content/uploads/wysija/themes/mailp/.

CVE-2014-4726
Published: 2014-07-27
Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors.

CVE-2014-2363
Published: 2014-07-26
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.

CVE-2014-2625
Published: 2014-07-26
Directory traversal vulnerability in the storedNtxFile function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to read arbitrary files via crafted input, aka ZDI-CAN-2023.

CVE-2014-2626
Published: 2014-07-26
Directory traversal vulnerability in the toServerObject function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to create files, and consequently execute arbitrary code, via crafted input, aka ZDI-CAN-2024.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.