Vulnerabilities / Threats
12/4/2013
10:21 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Votiro Launches Free Cloud-Based File Sanitization Service

New service neutralizes cyberthreats attached to suspicious files

Tel Aviv, Israel (December 3, 2013) – Votiro, the provider the Secure Data Sanitization solution for protecting organizations against zero-day and other ongoing cyber-threats, today announced that the company has launched a free cloud-based file sanitization service.

Votiro's new file sanitization service analyzes uploaded files for the presence of malicious code and facilitates the quick neutralization of zero-day exploits and the detection of trojans, viruses and worms. This new file sanitization service sanitizes an uploaded file by making micro-changes to its structure and metadata, which eliminates the possibility of malicious code running from the file, and then scanning it with a series of leading anti-virus programs.

This new file sanitization service is part of Votiro's overall Secure Data Sanitization solution. Votiro's Secure Data Sanitization solution automatically performs the same sanitization process as the new cloud service on all incoming files, including files attached to emails, downloaded from the Internet and transferred from removable media. This comprehensive process does not affect the usability of a file and is seamlessly integrated into an organization's IT infrastructure.

"Our Secure Data Sanitization solution provides zero-day protection that eliminates malicious cyber-threats before they have a chance to penetrate an organization's network and attack critical IT infrastructure and extract sensitive data," explained Itay Glick, Founder and CEO of Votiro. "Our new cloud service allows organizations to experience the strengths of our sanitization process and understand the overall benefits of our Secure Data Sanitization solution."

Votiro's new file sanitization service is available at https://cloud.votiro.com/.

About Votiro

Votiro delivers organizations with essential zero-day protection against unknown and ongoing cyber-threats. The company's Secure Data Sanitization solution provides a robust process and patent-pending technology for cleansing all incoming files from potential cyber-threats. The company was founded in 2009 by a team of senior security experts with backgrounds in the intelligence and security industries and is based in Tel Aviv, Israel. Customers include banks and other financial institutions, government agencies, energy and utilities companies, telecommunications service providers and large enterprises, who are relying on Votiro solutions to protect their critical IT infrastructure and sensitive data.

For more information, please visit www.votiro.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web