Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/22/2007
06:29 AM
50%
50%

Promisec Offers Free Audit

Promisec intros a service for VARs, allowing security product resellers to provide customers with insight into their security condition

NEW YORK -- PromisecT Ltd, a technology leader in endpoint security management with the industry's first agentless monitoring and remediation solution that supports layered internal security management, today announced a new security audit service for VARs, allowing security product resellers to provide prospective customers with insight into their security condition. The service provides reporting on how employees are complying with corporate security policies and identifies endpoint threats of all kinds, from unauthorized applications and USB device connections to rogue processes, services and missing third-party security applications and Microsoft service packs.

The service, normally priced at more than $10,000 for an onsite security audit, is being offered free of charge to give channel partners a competitive advantage in the highly competitive IT security market. The audit service is another example of Promisec's commitment to helping VARs attain greater traction in the IT security space. In about an hour, channel partners can generate a detailed report that shows where organizations are most vulnerable to help determine how to secure the internal network. Promisec's audit is not limited to basic checks but provides comprehensive visibility to hidden threats that can go unnoticed indefinitely. Some hidden threats that have been found in networks we have audited include:

- Unknown Network Shares (shared folders)
- Simultaneous (dual) Wireless connectivity inside a LAN
- Stealth Applications leaking information to external parties
- Keyloggers and Trojans silently transmitting confidential data
- Bypassed Group Policies and proxy servers.

According to industry research firm, Infonetics, demand for endpoint security solutions will grow to $3.9 billion by 2008, up from just $323 million in 2005, a 1101 percent increase. Recent CSI and FBI reports indicate that most security issues originate inside the network. With new regulations in place, company officers can now be held personally responsible for breaches of security. Infractions such as unauthorized storage of sexually explicit material on corporate servers can create problems that are just as serious as the latest worm or Trojan horse. But companies cannot resolve vulnerabilities and tighten security policies if they do not know which endpoint threats exist on their networks.

"Our channel partners can now offer customers a comprehensive level of insight into their network security so organizations can eliminate significant threats before they become security breaches," said Ari Tammam, vice president of channel marketing for Promisec.

Promisec Ltd.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17513
PUBLISHED: 2019-10-18
An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
CVE-2019-8216
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8217
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-8218
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8219
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .