10:50 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

SecPod Debuts ANCOR And Saner, Its Security Platform And Vulnerability Mitigation Solution

Additionally, SecPod announced the availability of SecPod Saner, a vulnerability mitigation solution for businesses and home users

BANGALORE, India, December 2, 2013 /PRNewswire/ --

ANCOR is a highly scalable, cloud based analytics and correlation engine that provides real time, practical, integrated security intelligence. Saner is the first of a suite of products to tap into ANCOR's engine. With Saner, businesses and home users can now easily identify and mitigate potential security vulnerabilities in endpoint devices.

SecPod Technologies, a leading information security company, has announced the rollout of its security platform, SecPod Ancor - an analytics and correlation engine. Additionally, SecPod announced the availability of SecPod Saner - a vulnerability mitigation solution for businesses and home users.

SecPod's ANCOR consists of an agent that resides on endpoint devices to collect and transmit requisite data to the highly scalable, cloud-based analytics and correlation engine. ANCOR collates information from the agents on endpoint devices, software reputation services, and vulnerability and malware data, with standards and best practices to provide real time, practical, integrated security intelligence.

"Strong defense is better than a weak cure and proactively assessing the vulnerabilities, fixing the loopholes, and strengthening the system along with providing real-time protection from attacks helps ensure a secure ecosystem,"

says Chandrashekhar, CEO. "ANCOR promises to deliver on that with a line of products to cover key areas of system security."

ANCOR is based on four binding principles - Visibility, Prevention, Learning, and Protection.

Using the services of ANCOR, SecPod Saner identifies potential security vulnerabilities, misconfigurations and missing patches and automatically remediates the system to keep it secure.

"With the availability of ANCOR and Saner," Greg Pottebaum, VP Business Development says. "Vulnerability management is now very affordable, practical, and effective, rather than being overly expensive and complicated." Greg adds, "Businesses and home users can now get enterprise-class security assurance with SecPod Saner at a fraction of previous costs."

About SecPod Technologies

SecPod Technologies is an information security products company. SecPod provides practical security solutions through its suite of products built on ANCOR, its highly scalable analytics and correlation engine. The company is headquartered in Bangalore, India. To learn more, visit

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Latest Comment: LOL.
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-17
DistUpgrade/ in Update Manager before 1:, 1:0.134.x before 1:, 1:0.142.x before 1:, 1:0.150.x before 1:, and 1:0.152.x before 1: does not properly create temporary files, which allows local users to obtain the XAUTHORITY file conte...

Published: 2014-04-17
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

Published: 2014-04-17
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.

Published: 2014-04-17
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External ...

Published: 2014-04-17
PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

Best of the Web