10:50 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

SecPod Debuts ANCOR And Saner, Its Security Platform And Vulnerability Mitigation Solution

Additionally, SecPod announced the availability of SecPod Saner, a vulnerability mitigation solution for businesses and home users

BANGALORE, India, December 2, 2013 /PRNewswire/ --

ANCOR is a highly scalable, cloud based analytics and correlation engine that provides real time, practical, integrated security intelligence. Saner is the first of a suite of products to tap into ANCOR's engine. With Saner, businesses and home users can now easily identify and mitigate potential security vulnerabilities in endpoint devices.

SecPod Technologies, a leading information security company, has announced the rollout of its security platform, SecPod Ancor - an analytics and correlation engine. Additionally, SecPod announced the availability of SecPod Saner - a vulnerability mitigation solution for businesses and home users.

SecPod's ANCOR consists of an agent that resides on endpoint devices to collect and transmit requisite data to the highly scalable, cloud-based analytics and correlation engine. ANCOR collates information from the agents on endpoint devices, software reputation services, and vulnerability and malware data, with standards and best practices to provide real time, practical, integrated security intelligence.

"Strong defense is better than a weak cure and proactively assessing the vulnerabilities, fixing the loopholes, and strengthening the system along with providing real-time protection from attacks helps ensure a secure ecosystem,"

says Chandrashekhar, CEO. "ANCOR promises to deliver on that with a line of products to cover key areas of system security."

ANCOR is based on four binding principles - Visibility, Prevention, Learning, and Protection.

Using the services of ANCOR, SecPod Saner identifies potential security vulnerabilities, misconfigurations and missing patches and automatically remediates the system to keep it secure.

"With the availability of ANCOR and Saner," Greg Pottebaum, VP Business Development says. "Vulnerability management is now very affordable, practical, and effective, rather than being overly expensive and complicated." Greg adds, "Businesses and home users can now get enterprise-class security assurance with SecPod Saner at a fraction of previous costs."

About SecPod Technologies

SecPod Technologies is an information security products company. SecPod provides practical security solutions through its suite of products built on ANCOR, its highly scalable analytics and correlation engine. The company is headquartered in Bangalore, India. To learn more, visit

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web