Analytics
11/6/2013
01:53 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Visualization Engine Provides Security Insight

SOLVE (Simple On-Line Visualization Engine) allows users to see security threats as they occur

CHICAGO – November 5th – North Nine today announced updates to their SOLVE product. SOLVE (Simple On-Line Visualization Engine) allows users to see security threats as they occur, track malicious activity in real time and provides users with actionable data and intelligence so they can fight back. Major changes in this update include even faster performance and expanded reporting for Symantec Endpoint Protection (SEP). Conventus, a leading national security consultancy, will bring the product to market as the exclusive reseller.

SOLVE closes the gaps in enterprise security quickly and efficiently and connects directly to Symantec Endpoint Protection, Symantec Critical System Protection and Symantec Data Loss Prevention, and other security products to generate a comprehensive view of security. Without installing new hardware or manual copying, SOLVE consolidates security data to show a real time view and provide actionable data. Users can see if security products are properly configured and deployed in a visual interface, and can take a closer look at individual products through drill-down views.

The North Nine team improved SOLVE by expanding reporting capabilities for Symantec Endpoint Protection (SEP) as well as introducing a new feature that allows users to add notes to charts. The update also brings a new printer-friendly view for dashboards and even faster performance than previous versions.

"There is no extensive back-end infrastructure required, it's easy to install, easy to configure, and infinitely easier to get the RIGHT data out in order to answer 'big data' questions" said Sarah Isaacs, Managing Partner of Conventus.

Conventus worked closely in conjunction with North Nine to provide tools that help identify suspicious behavior and illuminate security risks. A Symantec National Platinum Partner, Conventus specializes in endpoint and server security, compliance and data loss prevention. Thought leaders in cyber security, the firm's management team has spoken and written widely on IT security.

To learn more about Conventus security solutions, visit www.conventus-sei.com

About Conventus Corporation

Conventus is a national information security consulting firm that protects companies from security attacks and data breaches. Founded in 2006, Conventus specializes in optimizing the performance and use of endpoint and server security software. The company also offers incident management as well as PCI, HIPAA, and SOX security compliance consulting. Conventus maintains close relationships as registered partners with several security software providers including Symantec, Palo Alto Networks (enterprise network firewalls), and Sourcefire (intrusion protection systems). Additionally, numerous Conventus senior consultants are nationally-recognized leaders in security program technologies and are actively involved with the Information Systems Security Association and (ISC)2, a global not-for-profit leader in educating and certifying information security professionals. In 2012, Conventus was ranked #581 overall and eighth in the Security sector of Inc. magazine's sixth annual Inc. 500|5000 listing. For more information, visit http://www.conventus-sei.com or call 312.421.3270.

About North Nine, LLC.

North Nine, LLC. was founded to pursue a critical gap in information security, compliance and risk management: enable access to business platform data in the form of machine, user and application data. Collecting, organizing and analyzing business platform data is one of the key activities organizations are undertaking to get a real picture of the risk the business faces from its IT environment. By monitoring and analyzing everything from server security data to server health data to compliance completeness--and more--North Nine turns business platform data into valuable insights no matter what business you're in. It's what we call Business Platform Intelligence. North Nine was founded in 2012 and has two primary product families; the SOLVE platform for data visualization, analysis and reporting and the NorthStar platform for business platform intelligence. For more information, visit http://www.northnine.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant