Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/12/2007
01:22 AM
50%
50%

AppliCure Seeks N.A. Resellers of Its WAF

Applicure seeks North American channel partners for SANS-highlighted Web application firewall software

NEW YORK -- Web application firewall vendor, Applicure Technologies Ltd, is gearing up to sign new partners as it announces its official channel launch. Highlighted in the recent SANS Institute Top-20 Security Risks report – the security industry benchmark for prioritizing IT security threats – Applicure’s technology protects against external and internal attacks on web applications.

For the first time ever, attacks on Web applications have been identified by the SANS Institute as the number one security threat. Applicure, which has been operating since 2004, recently established its North American operations and is now keen to build a strong relationship with the channel.

Applicure’s flagship software product - dotDefender - provides dedicated web application security that complements network protection (firewall, IPS/ IDS). This innovative website security software provides strong protection against SQL Injection, Cross-site scripting, Path Traversal, Defacement and many other application attacks. dotDefender is multi-platform, working on Apache, IIS, and ISA Server, with central management and reporting. Implemented as a software plug-in, it is rapidly deployed, and requires minimal maintenance, providing the best TCO in the industry.

Applicure also provides a free downloadable security monitor that identifies attempts to hack the website or application in real time. It allows companies to assess their exposure based on actual attacks, and prioritize their investment accordingly.

Applicure’s technology is well suited for any size of company and is a particularly strong fit for the mid-market sector which has the same security issues as larger enterprises but without the resources and budget to deal with them effectively. This means channel partners can target all their clients with the comprehensive, low TCO, high ROI web application security that Applicure offers and are likely to see significant opportunities with their mid-sized customers.

Carl Hartman, Director of North American Operations said, “Applicure will select partners based on track record, years in business, industry expertise and proven commitment to their customers’ success. Business partners can work with Applicure to create a partnership that fits their business’ needs and goals, ranging from referrals to a full VAR relationship.”

Applicure Technologies Ltd.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-18178
PUBLISHED: 2021-05-18
Path Traversal in HongCMS v4.0.0 allows remote attackers to view, edit, and delete arbitrary files via a crafted POST request to the component "/hcms/admin/index.php/language/ajax."
CVE-2020-20214
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from an assertion failure vulnerability in the btest process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
CVE-2020-20222
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20236
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
CVE-2020-20237
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.