Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:44 PM
Dark Reading
Dark Reading
Products and Releases

Agiliance Integrates With VeriSign iDefense

Agiliance Threat and Vulnerability Manager's out-of-the-box integration with VeriSign iDefense Security Intelligence Services provides threat and vulnerability protection

San Jose, California, February 23, 2010 - Agiliance Inc., the leading independent provider of integrated Governance, Risk and Compliance (GRC) solutions, today announced its threat and vulnerability automation solution is integrated with iDefense Security Intelligence Services, a leading vulnerability intelligence solution from VeriSign Inc. (NASDAQ: VRSN), the trusted provider of Internet infrastructure services for the networked world. Agiliance Threat and Vulnerability Manager's out-of-the-box integration with VeriSign iDefense Security Intelligence Services provides extensive threat and vulnerability protection by combining in-depth security threat intelligence, vulnerability scanning data, real-time correlation, advanced reporting, and vulnerability lifecycle management.

Agiliance Threat and Vulnerability Manager offers an integrated platform where a security operations group can integrate various threat and vulnerability data sources to create an all-inclusive security picture for the enterprise and manage the full lifecycle of vulnerabilities from detection to remediation. Agiliance's correlation engine cross-maps data feeds from iDefense and the National Vulnerability Database (NVD) to create a comprehensive threat and vulnerability database. This threat and vulnerability database correlates with data from asset database to create a comprehensive virtual scan and identify vulnerable assets, including installed applications. These virtual scan results are further correlated to vulnerability scanners, configuration checkers, and patch management systems to provide a 360-degree view of an enterprise's vulnerability posture. This integrated solution enables CIO's and CISO's to build an enterprise-wide threat and vulnerability program and maximize investment from existing and future security technologies.

Leveraged by an extensive, worldwide intelligence gathering network, proven methodology and highly skilled security professionals, VeriSign iDefense security intelligence services deliver deep analysis and actionable intelligence related to vulnerabilities, malicious code and geopolitical threats to protect critical infrastructure from attacks. "We are very excited about Agiliance's automation solution for iDefense intelligence," said Mike Denning, vice president of enterprise security at VeriSign. "Agiliance's technology allows customer to easily integrate iDefense intelligence into their security operations, enabling customers to achieve a higher level of protection and operational efficiency. This integrated solution will help iDefense and Agiliance joint customers extract maximum value from their security investments."

Agiliance Threat and Vulnerability Manager enables closed-loop vulnerability lifecycle management, including tracking, remediation, review, analysis and reporting. Vulnerabilities are scored and ranked automatically based on criticality of affected asset and business impact. Using Threat and Vulnerability Manager, security operations team can review, prioritize, and prescribe appropriate mitigation actions using Agiliance's highly configurable workflow engine. The Agiliance solution can further fully automated the patching process through bi-directional integrations with patching and tickeitng applications.

"Enterprises are facing unprecedented level of threats today which are increasing in volume and sophistication. Attacks are more intelligent about exploring gaps in enterprise security silos. An integrated threat and vulnerability management program is a proactive defense against these sophisticated attacks. A robust program must be supported with cutting edge technologies offering real-time integration and end-to-end automation," said Joe Fantuzzi, President and CEO, Agiliance. "This new solution with VeriSign iDefense is a prime example of a complete end-to-end threat and vulnerability technology platform. We look forward to working with VeriSign, developing technology that addresses the numerous compliance and security issues affecting organizations today." If you are attending RSA and would like to schedule a live demonstration of the Agiliance Threat and Vulnerability Manager and VeriSign iDefense integrated technology solution, please contact Joe Austin at (818) 591-2646 or [email protected] Agiliance will be conducting on-site meetings and demonstrations in the VeriSign Booth #1717 and the Agiliance Booth #216.

About Agiliance Agiliance (www.agiliance.com), founded in 2005, is a leading independent provider of enterprise Governance, Risk and Compliance (GRC) solutions. The Agiliance GRC solution enables organizations to manage their IT and operational risks more effectively, while reducing the cost of meeting compliance mandates. Agiliance RiskVisionTM is a fully integrated suite of GRC solutions, delivered on a purpose-built GRC technology platform. Global Fortune 5000 companies leverage Agiliance's award-winning technologies to address increasingly stringent GRC requirements and complex security threats. The Agiliance RiskVision platform offers an agile, modular approach to deploying GRC so that customers can meet mounting requirements. RiskVision has received the highest rating of "Strong Positive" in the latest Gartner MarketScope for IT-GRCM, as well as the highest rating of "Leader" in the latest Forrester Wave for IT Risk and Compliance Software. With strong backing from leading technology venture funds, Agiliance has established a premiere market position and has set a strong track record of production innovation in GRC.

Contact Information:

Agiliance Media Relations: Joe Austin Ventana Public Relations 818-591-2646 [email protected]

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.