Analytics
11/6/2013
01:53 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Visualization Engine Provides Security Insight

SOLVE (Simple On-Line Visualization Engine) allows users to see security threats as they occur

CHICAGO – November 5th – North Nine today announced updates to their SOLVE product. SOLVE (Simple On-Line Visualization Engine) allows users to see security threats as they occur, track malicious activity in real time and provides users with actionable data and intelligence so they can fight back. Major changes in this update include even faster performance and expanded reporting for Symantec Endpoint Protection (SEP). Conventus, a leading national security consultancy, will bring the product to market as the exclusive reseller.

SOLVE closes the gaps in enterprise security quickly and efficiently and connects directly to Symantec Endpoint Protection, Symantec Critical System Protection and Symantec Data Loss Prevention, and other security products to generate a comprehensive view of security. Without installing new hardware or manual copying, SOLVE consolidates security data to show a real time view and provide actionable data. Users can see if security products are properly configured and deployed in a visual interface, and can take a closer look at individual products through drill-down views.

The North Nine team improved SOLVE by expanding reporting capabilities for Symantec Endpoint Protection (SEP) as well as introducing a new feature that allows users to add notes to charts. The update also brings a new printer-friendly view for dashboards and even faster performance than previous versions.

"There is no extensive back-end infrastructure required, it's easy to install, easy to configure, and infinitely easier to get the RIGHT data out in order to answer 'big data' questions" said Sarah Isaacs, Managing Partner of Conventus.

Conventus worked closely in conjunction with North Nine to provide tools that help identify suspicious behavior and illuminate security risks. A Symantec National Platinum Partner, Conventus specializes in endpoint and server security, compliance and data loss prevention. Thought leaders in cyber security, the firm's management team has spoken and written widely on IT security.

To learn more about Conventus security solutions, visit www.conventus-sei.com

About Conventus Corporation

Conventus is a national information security consulting firm that protects companies from security attacks and data breaches. Founded in 2006, Conventus specializes in optimizing the performance and use of endpoint and server security software. The company also offers incident management as well as PCI, HIPAA, and SOX security compliance consulting. Conventus maintains close relationships as registered partners with several security software providers including Symantec, Palo Alto Networks (enterprise network firewalls), and Sourcefire (intrusion protection systems). Additionally, numerous Conventus senior consultants are nationally-recognized leaders in security program technologies and are actively involved with the Information Systems Security Association and (ISC)2, a global not-for-profit leader in educating and certifying information security professionals. In 2012, Conventus was ranked #581 overall and eighth in the Security sector of Inc. magazine's sixth annual Inc. 500|5000 listing. For more information, visit http://www.conventus-sei.com or call 312.421.3270.

About North Nine, LLC.

North Nine, LLC. was founded to pursue a critical gap in information security, compliance and risk management: enable access to business platform data in the form of machine, user and application data. Collecting, organizing and analyzing business platform data is one of the key activities organizations are undertaking to get a real picture of the risk the business faces from its IT environment. By monitoring and analyzing everything from server security data to server health data to compliance completeness--and more--North Nine turns business platform data into valuable insights no matter what business you're in. It's what we call Business Platform Intelligence. North Nine was founded in 2012 and has two primary product families; the SOLVE platform for data visualization, analysis and reporting and the NorthStar platform for business platform intelligence. For more information, visit http://www.northnine.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web