Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/20/2010
03:02 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

nCircle Announces Cloud-Based Perimeter Profiler

Virtualized appliance enables organizations to assess their Internet-facing assets from an external perspective

SAN FRANCISCO—May 19, 2010—nCircle, the leader in security and compliance auditing solutions, today announced the nCircle Perimeter Profiler™, a cloud-based virtualized appliance that enables organizations to assess their Internet-facing assets from an external perspective. Perimeter Profiler extends the reach of nCircle IP360™ to include external assets and their related network, operating system and web application vulnerabilities. This perspective is the same public view of the organization’s assets that attackers have and provides crucial intelligence to proactively reduce enterprise risk.

The Perimeter Profiler is part of nCircle IP360™, nCircle’s market-leading vulnerability and risk management solution, giving customers a 360-degree view – inside and out – of their network. Because it is fully integrated, customers get a consolidated view of their entire network using the same objective metrics to measure their external security as they use with their internal security. Perimeter Profiler connects to the IP360 central console just like a hardware Device Profiler appliance, so there is nothing new to learn; the Perimeter Profiler enables customers to connect a cloud-based, virtualized instance into their existing IP360 deployment within minutes.

“In today’s sophisticated threat environment, enterprises are looking for a thorough assessment of their network, inside and out, with consistent measurement and consolidated reporting,” said Alex Quilter, Senior Product Line Manager at nCircle. “nCircle Perimeter Profiler delivers, offering a cloud-based virtualized appliance that is easy to deploy, easy to manage and integrates with customers’ existing nCircle IP360 vulnerability management system.”

For more information, please visit the nCircle.com website.

About nCircle Suite360 nCircle provides the world's most comprehensive suite of solutions for agentless security ad configuration auditing for physical and virtual IT environments. nCircle’s solutions combine the broadest discovery of networked systems and their operating systems, applications, vulnerabilities and configurations with advanced analytics to help enterprises reduce security risk and achieve compliance. nCircle's solutions includes IP360™ for vulnerability management and risk management, WebApp360™ for web application vulnerability auditing, Configuration Compliance Manager (CCM)™ for configuration auditing and file integrity monitoring, Certified PCI Scan Service™ for on-demand self-service PCI scanning, and Security Intelligence Hub™ for IT governance, risk and compliance (ITGRC) reporting and analytics.

About nCircle nCircle is the leading provider of automated security and compliance auditing solutions. More than 4,500 enterprises, government agencies and service providers around the world rely on nCircle's proactive solutions to manage and reduce security risk and achieve compliance on their networks. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information about nCircle is available at www.ncircle.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-18178
PUBLISHED: 2021-05-18
Path Traversal in HongCMS v4.0.0 allows remote attackers to view, edit, and delete arbitrary files via a crafted POST request to the component "/hcms/admin/index.php/language/ajax."
CVE-2020-20214
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from an assertion failure vulnerability in the btest process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
CVE-2020-20222
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20236
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
CVE-2020-20237
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.