Analytics
11/6/2013
01:53 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Visualization Engine Provides Security Insight

SOLVE (Simple On-Line Visualization Engine) allows users to see security threats as they occur

CHICAGO – November 5th – North Nine today announced updates to their SOLVE product. SOLVE (Simple On-Line Visualization Engine) allows users to see security threats as they occur, track malicious activity in real time and provides users with actionable data and intelligence so they can fight back. Major changes in this update include even faster performance and expanded reporting for Symantec Endpoint Protection (SEP). Conventus, a leading national security consultancy, will bring the product to market as the exclusive reseller.

SOLVE closes the gaps in enterprise security quickly and efficiently and connects directly to Symantec Endpoint Protection, Symantec Critical System Protection and Symantec Data Loss Prevention, and other security products to generate a comprehensive view of security. Without installing new hardware or manual copying, SOLVE consolidates security data to show a real time view and provide actionable data. Users can see if security products are properly configured and deployed in a visual interface, and can take a closer look at individual products through drill-down views.

The North Nine team improved SOLVE by expanding reporting capabilities for Symantec Endpoint Protection (SEP) as well as introducing a new feature that allows users to add notes to charts. The update also brings a new printer-friendly view for dashboards and even faster performance than previous versions.

"There is no extensive back-end infrastructure required, it's easy to install, easy to configure, and infinitely easier to get the RIGHT data out in order to answer 'big data' questions" said Sarah Isaacs, Managing Partner of Conventus.

Conventus worked closely in conjunction with North Nine to provide tools that help identify suspicious behavior and illuminate security risks. A Symantec National Platinum Partner, Conventus specializes in endpoint and server security, compliance and data loss prevention. Thought leaders in cyber security, the firm's management team has spoken and written widely on IT security.

To learn more about Conventus security solutions, visit www.conventus-sei.com

About Conventus Corporation

Conventus is a national information security consulting firm that protects companies from security attacks and data breaches. Founded in 2006, Conventus specializes in optimizing the performance and use of endpoint and server security software. The company also offers incident management as well as PCI, HIPAA, and SOX security compliance consulting. Conventus maintains close relationships as registered partners with several security software providers including Symantec, Palo Alto Networks (enterprise network firewalls), and Sourcefire (intrusion protection systems). Additionally, numerous Conventus senior consultants are nationally-recognized leaders in security program technologies and are actively involved with the Information Systems Security Association and (ISC)2, a global not-for-profit leader in educating and certifying information security professionals. In 2012, Conventus was ranked #581 overall and eighth in the Security sector of Inc. magazine's sixth annual Inc. 500|5000 listing. For more information, visit http://www.conventus-sei.com or call 312.421.3270.

About North Nine, LLC.

North Nine, LLC. was founded to pursue a critical gap in information security, compliance and risk management: enable access to business platform data in the form of machine, user and application data. Collecting, organizing and analyzing business platform data is one of the key activities organizations are undertaking to get a real picture of the risk the business faces from its IT environment. By monitoring and analyzing everything from server security data to server health data to compliance completeness--and more--North Nine turns business platform data into valuable insights no matter what business you're in. It's what we call Business Platform Intelligence. North Nine was founded in 2012 and has two primary product families; the SOLVE platform for data visualization, analysis and reporting and the NorthStar platform for business platform intelligence. For more information, visit http://www.northnine.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2413
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.

CVE-2012-5244
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Banana Dance B.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) return, (2) display, (3) table, or (4) search parameter to functions/suggest.php; (5) the id parameter to functions/widgets.php, (6) the category parameter to...

CVE-2012-5694
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allow remote attackers to execute arbitrary SQL commands via the (1) agentPhNo, (2) controlPhNo, (3) agentURLPath, (4) agentControlKey, or (5) platformDD1 parameter to frameworkgui/attach2Agents.p...

CVE-2012-5695
Published: 2014-10-20
Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS m...

CVE-2012-5696
Published: 2014-10-20
Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 does not properly restrict access to frameworkgui/config, which allows remote attackers to obtain the plaintext database password via a direct request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.