Vulnerabilities / Threats
1/28/2007
10:30 AM
50%
50%

EEye Adds AV to Blink

EEye Digital Security incorporates antivirus protection into Blink Professional, its endpoint security product

ALISO VIEJO, Calif. -- eEye Digital Security®, the leading developer of system security software and the foremost contributor to security research and innovation, today announced the latest version of Blink® Professional, its award-winning endpoint security technology. eEye is combining its own anti-virus dynamic heuristics technology with ‘sandboxing’ technology from leading anti-virus vendor Norman Data Defense to complete Blink Professional 3.0 as a single, small-footprint agent, incorporating multi-layered security methods to protect against both known and unknown vulnerabilities in real-time, thus making it the last security product enterprises and SMBs will need to purchase to stop 100 percent of malware attacks, regardless of signatures or patch updates.

“The notion of standalone security products is dead,” said Marc Maiffret, eEye’s founder and CTO. “Customers don’t want to be nickel-and-dimed to death and are frustrated over the pricing, lack of integration and added systems management costs of using multiple tools. Enterprises need integration in order to have a complete security solution and the addition of Norman’s anti-virus technology pushes Blink Professional even further ahead as the industry’s most comprehensive unified client security product.”

Deployed as a software agent on a Windows-based server, desktop PC or laptop, Blink Professional leverages multiple layers of protection—more so than any other endpoint security product—to shield individual digital assets from attacks and keep systems up and running. Blink Professional delivers the industry’s most comprehensive endpoint security for attacks that are affecting users today as an integrated, optimized single agent in order to reduce the memory and computing resources needed. Blink Professional also serves as a platform to which future security functionality can be added, effectively making it the last security agent that IT has to install and manage. In addition, Blink Professional can be deployed and managed from a central location, making it ideal for distributed network environments.

eEye Digital Security

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice one
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0702
Published: 2015-04-20
Unrestricted file upload vulnerability in the Custom Prompts upload implementation in Cisco Unified MeetingPlace 8.6(1.9) allows remote authenticated users to execute arbitrary code by using the languageShortName parameter to upload a file that provides shell access, aka Bug ID CSCus95712.

CVE-2015-0703
Published: 2015-04-20
Cross-site scripting (XSS) vulnerability in the administrative web interface in Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCus95857.

CVE-2015-1235
Published: 2015-04-19
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.

CVE-2015-1236
Published: 2015-04-19
The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a cr...

CVE-2015-1237
Published: 2015-04-19
Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages ...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.