Risk
9/11/2012
03:13 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Wurldtech Achilles Test Software Now Available For Development Engineers Of Mission-Critical Embedded Devices

Solution is software version of Achilles Test Platform

VANCOUVER, British Columbia, Sept. 5, 2012 /PRNewswire/ -- Wurldtech Security Technologies, leaders in protecting mission-critical connected devices from persistent and dynamic cyber security threats, today announced the release of its Achilles Test Software, the software version of its Achilles Test Platform, extending its Achilles Test family of cyber security testing products to development teams of mission critical embedded devices.

Significant SCADA cyber attacks are plaguing the industry. Industrial Control Systems have evolved into complex, open, inter-connected networks, creating significant challenges for developers and manufacturers of mission-critical devices that are at the core of nuclear power plants, oil refineries, smart grids and medical applications.

"The Achilles Test Software is the next step in elevating industry standards to protect mission-critical connected devices from persistent cyber security threats," said Wurldtech CTO and co-founder, Nate Kube. "Our goal is to provide a complete cyber security solution supporting the entire product lifecycle, from development to commissioning, implementation and operation of critical infrastructure, ensuring the delivery of secure products, increased ROI and protection of brand equity for both the device manufacturer and their customers."

Achilles Test Software delivers the tools that development teams require to test critical software early in the development cycle, before they enter the QA lab.

It provides the means to proactively expose and correct vulnerabilities and validate system resiliency in a real-time environment, before the products are released and deployed in high-availability process control networks.

The Achilles Product Portfolio - Analyze, Discover, Mitigate and Certify

Wurldtech provides a total set of analysis, software, hardware and certification products that provide stakeholders with a set of tools to protect and mitigate against Zero-Day threats, malware and cyber attacks.

-- Achilles Test Software- Previously available only as a comprehensive

appliance - Achilles Test Platform, Achilles Test Software puts Achilles

testing in the hands of development and quality assurance (QA) teams,

enabling a corporate and strategic focus to cyber testing by allowing

for candidate software and hardware testing earlier in the development

cycle.

-- Achilles Test Platform- Hardware platform designed as a universal test

bench to allow equipment manufacturers of all sizes to conduct

comprehensive security and robustness testing throughout the product

development lifecycle. Engineers can now utilize Achilles Test Software

to test for device vulnerabilities at the earliest stage of development,

using Achilles Test Platform for final verification testing.

-- Achilles Communication Certification- Verifies network robustness of

industrial control devices by subjecting the device to a standardized

set of network tests. Certification is provided by Wurldtech engineering

teams upon inspection of testing data.

-- Achilles Practices Certification- Valued-added program tailored to the

needs of system owners and operators, verifies the device manufacturers

security practices and procedures across the product's lifecycle.

About Wurldtech Security Technologies

Founded in 2007, Wurldtech is a software company providing protection for mission critical connected devices against the persistent and dynamic threat of cyber attack. Wurldtech follows our customers' security lifecycle by providing innovative assessment products to discover and analyse threat and vulnerability profiles; mitigation of known vulnerabilities in installed networks with Achilles Threat Intelligence Signatures and device and development practice certification through Achilles Certification. Wurldtech's internationally recognized cyber security experts help industrial stakeholders identify and mitigate cyber security vulnerabilities to reduce the risk and cost of attacks.

Global customers worldwide spanning Oil & Gas, Electric Power, Medical, Nuclear, Chemical and Water Treatment markets currently use Wurldtech solutions. Visit wurldtech.comfor more information.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web