Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/2/2020
11:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Armor Upgrades Armor Anywhere Threat Detection and Response Technology

New features include the flexibility to turn security capabilities on and off, and easily ingest log data from other sources.

Dallas, TX, June 2, 2020 —Armor®, a leading global cybersecurity software company that protects workloads in public, hybrid and private cloud environments, announced today that it has released a major upgrade to its flagship product, Armor Anywhere. With these latest enhancements, Armor delivers stronger threat detection and response while giving its customers  greater operational control over their security.

Some of the new features in Armor Anywhere include the flexibility to turn security capabilities on and off, and easily ingest log data from other sources,  making it one of the most flexible platforms on the market. New security capabilities include the addition of Intrusion Prevention, as well as Policy Recommendation Scans that suggest and automatically implement policies to enhance the security posture of an end user’s environment. Armor has also added features designed to streamline processes for DevOps users and security analysts.

“With these new capabilities and enhancements to Armor Anywhere, we can now ingest and analyze even more data from a wide variety of sources, providing  better protection for our customers,” said Mark Woodward, Armor CEO. “We’ve also added key improvements in how customers can visualize their data and manage their security environments. We are extremely excited about the advancements this new release brings to our customers.”

New Armor Anywhere Features

  • Intrusion Prevention System (IPS)

Armor Anywhere now provides Intrusion Prevention, as well as Intrusion Detection, so customers can detect and block cyber threats.

  • Policy Recommendation Scans

Armor scans the hosts’ operating system, installed applications, Windows registry, open ports, directory listings, file system, any running processes and services. If vulnerabilities or outdated rules are detected, recommended policy changes will be provided to the customer or the customer can choose to have those changes automatically implemented.

  • Log and Data Management

Armor can ingest additional log sources to be analyzed and correlated against threats. These sources include event logs from cloud-native sources, network appliances and security devices. With the Log Search and Visualization feature, customers can do deep querying and analysis, create custom dashboards, and produce charts, graphs and custom reports of their data sets.  Armor has also added Security Incident Connectors so that a  security event or incident, discovered by Armor, can easily be ingested  and analyzed by the customer’s internal security tools.   

  • Operational Control  

Armor’s customers can turn on or off any security features, using the Command Line Interface (CLI). This can be done for one virtual machine or can be done across multiple virtual machines at the same time. Customers can also use the “Toolbox” feature to schedule or automatically deploy the CLI command in their environment.

Combined, these new features and enhancements enable Armor to see more, ingest more, analyze more and block more for its customers. It also enables Armor’s customers to better scale and adapt their security to meet their business needs. As a result, these organizations’ assets are better protected, allowing them to focus on their priorities.

About Armor

Armor is a global cybersecurity software company that simplifies protecting data and applications in private, public or hybrid cloud environments. Armor Anywhere provides technology to detect and respond to threats and can be activated in minutes.  Armor also helps organizations comply to major regulatory frameworks and controls. Armor combines workload protection, analytics from cloud-native sources, and other security data to provide unparalleled insight into threats facing organizations. Armor’s cybersecurity experts monitor customer environments 24/7/365 and if an attack takes place, helps customers respond quickly and effectively. Armor protects over 1000 customers in over 40 countries. To learn more, visit  www.armor.com or follow @armor on Twitter.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.