Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/31/2006
12:29 PM
50%
50%

Arxceo, JCI Team

Arxceo has completed the integration of its patented technologies, Plug and Protect and Tag-UR-IT into JCI's B-Mobile PHS product

HUNTSVILLE, Ala. -- Arxceo® Corporation, a provider of anti-reconnaissance and anomaly-based attack prevention technology, today announced that it has completed the integration of its patented technologies, Plug and Protect (PnPRO™) and Tag-UR-IT™ into Japan Communications Inc.’s (JCI) award-winning B-Mobile PHS product to create a new, endpoint security solution for Windows XP, called Personal IPS. Personal IPS is a host-based Intrusion Prevention System providing secure data communications services to both consumer and corporate customers in Japan.

This marks the first joint product release since JCI acquired a majority ownership in Arxceo in February, 2006. JCI is recognized as the market-leading Mobile Virtual Network Operator (MVNO) in Japan. Demonstrating its commitment to providing secure mobile communications, JCI has created Arxceo Japan, a wholly-owned subsidiary. Arxceo Japan will sell Personal IPS along with Arxceo’s line of security appliances.

The Personal IPS solution leverages Arxceo’s tiny but effective, patented security engine which is embedded in the product to ensure maximum network protection. Through this unique technology, Personal IPS can provide scan blocking and protect against illegal access, network worms and address spoofing to secure a company’s mobile workforce. In September, Arxceo was awarded a crucial U.S. patent covering its PnPRO and Tag-UR-IT technologies for improving network security. Arxceo’s technology for network attack protection uses a ‘signature-less’ anti-reconnaissance-based approach with anomaly and behavioral traffic analysis engines continually monitoring for zero-day attacks.

“We are thrilled to see our technology successfully embedded into Personal IPS. This product is critical for the needs of both consumers and companies alike who want secure broadband access,” said Don Davidson, Arxceo CEO. “This further confirms that our unique anti-reconnaissance design and extremely efficient traffic analysis offers the best anomaly-based security option for networks, wireless access points and now our first end-point PC-based implementation.”

Arxceo Corp.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17667
PUBLISHED: 2019-10-17
Comtech H8 Heights Remote Gateway 2.5.1 devices allow XSS and HTML injection via the Site Name (aka SiteName) field.
CVE-2019-17666
PUBLISHED: 2019-10-17
rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
CVE-2019-17607
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php servername parameter.
CVE-2019-17608
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbname parameter.
CVE-2019-17609
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbusername parameter.