Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/12/2007
01:27 AM
50%
50%

Sourcefire Announces Certified ClamAV Support

Leading open source solution now delivers data loss prevention modules to protect against credit card and Social Security number theft

COLUMBIA, Md. -- Open source innovator and SNORT® creator, Sourcefire, Inc. (Nasdaq: FIRE), a leader in network intrusion prevention, today announced Certified ClamAV Support providing subscribers fast, expert response to technical inquiries. The company is also delivering two new Data Loss Prevention (DLP) modules, enabling ClamAV users to protect themselves against credit card and social security number loss or theft.

“ClamAV is one of the most respected open source security solutions in the world, and Sourcefire is now enabling organizations protecting critical assets to implement this leading technology with the confidence that it is backed by one of the strongest support organizations in the industry,” said Martin Roesch, CTO and Founder of Sourcefire and Creator of Snort. “Many of our commercial customers and open source users are looking for solutions that can stop critical personal information from leaving their networks, but have been reluctant to invest in expensive, stand-alone technologies. By adding DLP capabilities to ClamAV, Sourcefire is providing the community with a trusted, innovative and commercially supported solution for protecting critical personal information against two of the leading forms of identity theft.”

With its new support offering, Sourcefire is delivering the commercial responsiveness required to provide large organizations with the confidence needed to implement ClamAV for protecting their critical environments. Certified ClamAV Support subscribers will now receive the same level of expertise and rapid response that Sourcefire commercial customers enjoy today. This provides both business and government organizations with both peace of mind and the ability to satisfy procurement guidelines.

“Sourcefire is providing the ClamAV community with the perfect combination of open source leadership backed by one of the security industry’s best customer support organizations,” said Tomasz Kojm, ClamAV project leader. “This combination of commercial support and new DLP rules is a significant step for ClamAV. We are excited that Sourcefire is dedicating the resources required to deliver the top tier support and innovation we always envisioned for our users.”

Sourcefire Inc. (Nasdaq: FIRE)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24259
PUBLISHED: 2021-05-05
The “Elementor Addon Elements� WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24260
PUBLISHED: 2021-05-05
The “Livemesh Addons for Elementor� WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24261
PUBLISHED: 2021-05-05
The “HT Mega – Absolute Addons for Elementor Page Builder� WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by ...
CVE-2021-24262
PUBLISHED: 2021-05-05
The “WooLentor – WooCommerce Elementor Addons + Builder� WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-priv...
CVE-2021-24263
PUBLISHED: 2021-05-05
The “Elementor Addons – PowerPack Addons for Elementor� WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scriptin...