Analytics
12/2/2013
10:50 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

SecPod Debuts ANCOR And Saner, Its Security Platform And Vulnerability Mitigation Solution

Additionally, SecPod announced the availability of SecPod Saner, a vulnerability mitigation solution for businesses and home users

BANGALORE, India, December 2, 2013 /PRNewswire/ --

ANCOR is a highly scalable, cloud based analytics and correlation engine that provides real time, practical, integrated security intelligence. Saner is the first of a suite of products to tap into ANCOR's engine. With Saner, businesses and home users can now easily identify and mitigate potential security vulnerabilities in endpoint devices.

SecPod Technologies, a leading information security company, has announced the rollout of its security platform, SecPod Ancor - an analytics and correlation engine. Additionally, SecPod announced the availability of SecPod Saner - a vulnerability mitigation solution for businesses and home users.

SecPod's ANCOR consists of an agent that resides on endpoint devices to collect and transmit requisite data to the highly scalable, cloud-based analytics and correlation engine. ANCOR collates information from the agents on endpoint devices, software reputation services, and vulnerability and malware data, with standards and best practices to provide real time, practical, integrated security intelligence.

"Strong defense is better than a weak cure and proactively assessing the vulnerabilities, fixing the loopholes, and strengthening the system along with providing real-time protection from attacks helps ensure a secure ecosystem,"

says Chandrashekhar, CEO. "ANCOR promises to deliver on that with a line of products to cover key areas of system security."

ANCOR is based on four binding principles - Visibility, Prevention, Learning, and Protection.

Using the services of ANCOR, SecPod Saner identifies potential security vulnerabilities, misconfigurations and missing patches and automatically remediates the system to keep it secure.

"With the availability of ANCOR and Saner," Greg Pottebaum, VP Business Development says. "Vulnerability management is now very affordable, practical, and effective, rather than being overly expensive and complicated." Greg adds, "Businesses and home users can now get enterprise-class security assurance with SecPod Saner at a fraction of previous costs."

About SecPod Technologies

SecPod Technologies is an information security products company. SecPod provides practical security solutions through its suite of products built on ANCOR, its highly scalable analytics and correlation engine. The company is headquartered in Bangalore, India. To learn more, visit http://www.secpod.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

CVE-2014-2393
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite 7.4.1 before 7.4.1-rev11 and 7.4.2 before 7.4.2-rev13 allows remote attackers to inject arbitrary web script or HTML via a Drive filename that is not properly handled during use of the composer to add an e-mail attachment.

CVE-2011-5279
Published: 2014-04-23
CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header.

CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Best of the Web