Analytics
11/6/2013
01:53 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Visualization Engine Provides Security Insight

SOLVE (Simple On-Line Visualization Engine) allows users to see security threats as they occur

CHICAGO – November 5th – North Nine today announced updates to their SOLVE product. SOLVE (Simple On-Line Visualization Engine) allows users to see security threats as they occur, track malicious activity in real time and provides users with actionable data and intelligence so they can fight back. Major changes in this update include even faster performance and expanded reporting for Symantec Endpoint Protection (SEP). Conventus, a leading national security consultancy, will bring the product to market as the exclusive reseller.

SOLVE closes the gaps in enterprise security quickly and efficiently and connects directly to Symantec Endpoint Protection, Symantec Critical System Protection and Symantec Data Loss Prevention, and other security products to generate a comprehensive view of security. Without installing new hardware or manual copying, SOLVE consolidates security data to show a real time view and provide actionable data. Users can see if security products are properly configured and deployed in a visual interface, and can take a closer look at individual products through drill-down views.

The North Nine team improved SOLVE by expanding reporting capabilities for Symantec Endpoint Protection (SEP) as well as introducing a new feature that allows users to add notes to charts. The update also brings a new printer-friendly view for dashboards and even faster performance than previous versions.

"There is no extensive back-end infrastructure required, it's easy to install, easy to configure, and infinitely easier to get the RIGHT data out in order to answer 'big data' questions" said Sarah Isaacs, Managing Partner of Conventus.

Conventus worked closely in conjunction with North Nine to provide tools that help identify suspicious behavior and illuminate security risks. A Symantec National Platinum Partner, Conventus specializes in endpoint and server security, compliance and data loss prevention. Thought leaders in cyber security, the firm's management team has spoken and written widely on IT security.

To learn more about Conventus security solutions, visit www.conventus-sei.com

About Conventus Corporation

Conventus is a national information security consulting firm that protects companies from security attacks and data breaches. Founded in 2006, Conventus specializes in optimizing the performance and use of endpoint and server security software. The company also offers incident management as well as PCI, HIPAA, and SOX security compliance consulting. Conventus maintains close relationships as registered partners with several security software providers including Symantec, Palo Alto Networks (enterprise network firewalls), and Sourcefire (intrusion protection systems). Additionally, numerous Conventus senior consultants are nationally-recognized leaders in security program technologies and are actively involved with the Information Systems Security Association and (ISC)2, a global not-for-profit leader in educating and certifying information security professionals. In 2012, Conventus was ranked #581 overall and eighth in the Security sector of Inc. magazine's sixth annual Inc. 500|5000 listing. For more information, visit http://www.conventus-sei.com or call 312.421.3270.

About North Nine, LLC.

North Nine, LLC. was founded to pursue a critical gap in information security, compliance and risk management: enable access to business platform data in the form of machine, user and application data. Collecting, organizing and analyzing business platform data is one of the key activities organizations are undertaking to get a real picture of the risk the business faces from its IT environment. By monitoring and analyzing everything from server security data to server health data to compliance completeness--and more--North Nine turns business platform data into valuable insights no matter what business you're in. It's what we call Business Platform Intelligence. North Nine was founded in 2012 and has two primary product families; the SOLVE platform for data visualization, analysis and reporting and the NorthStar platform for business platform intelligence. For more information, visit http://www.northnine.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2808
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a rel...

CVE-2014-9713
Published: 2015-04-01
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.

CVE-2015-0259
Published: 2015-04-01
OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage.

CVE-2015-0800
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2...

CVE-2015-0801
Published: 2015-04-01
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.