Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/2/2020
11:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Armor Upgrades Armor Anywhere Threat Detection and Response Technology

New features include the flexibility to turn security capabilities on and off, and easily ingest log data from other sources.

Dallas, TX, June 2, 2020 —Armor®, a leading global cybersecurity software company that protects workloads in public, hybrid and private cloud environments, announced today that it has released a major upgrade to its flagship product, Armor Anywhere. With these latest enhancements, Armor delivers stronger threat detection and response while giving its customers  greater operational control over their security.

Some of the new features in Armor Anywhere include the flexibility to turn security capabilities on and off, and easily ingest log data from other sources,  making it one of the most flexible platforms on the market. New security capabilities include the addition of Intrusion Prevention, as well as Policy Recommendation Scans that suggest and automatically implement policies to enhance the security posture of an end user’s environment. Armor has also added features designed to streamline processes for DevOps users and security analysts.

“With these new capabilities and enhancements to Armor Anywhere, we can now ingest and analyze even more data from a wide variety of sources, providing  better protection for our customers,” said Mark Woodward, Armor CEO. “We’ve also added key improvements in how customers can visualize their data and manage their security environments. We are extremely excited about the advancements this new release brings to our customers.”

New Armor Anywhere Features

  • Intrusion Prevention System (IPS)

Armor Anywhere now provides Intrusion Prevention, as well as Intrusion Detection, so customers can detect and block cyber threats.

  • Policy Recommendation Scans

Armor scans the hosts’ operating system, installed applications, Windows registry, open ports, directory listings, file system, any running processes and services. If vulnerabilities or outdated rules are detected, recommended policy changes will be provided to the customer or the customer can choose to have those changes automatically implemented.

  • Log and Data Management

Armor can ingest additional log sources to be analyzed and correlated against threats. These sources include event logs from cloud-native sources, network appliances and security devices. With the Log Search and Visualization feature, customers can do deep querying and analysis, create custom dashboards, and produce charts, graphs and custom reports of their data sets.  Armor has also added Security Incident Connectors so that a  security event or incident, discovered by Armor, can easily be ingested  and analyzed by the customer’s internal security tools.   

  • Operational Control  

Armor’s customers can turn on or off any security features, using the Command Line Interface (CLI). This can be done for one virtual machine or can be done across multiple virtual machines at the same time. Customers can also use the “Toolbox” feature to schedule or automatically deploy the CLI command in their environment.

Combined, these new features and enhancements enable Armor to see more, ingest more, analyze more and block more for its customers. It also enables Armor’s customers to better scale and adapt their security to meet their business needs. As a result, these organizations’ assets are better protected, allowing them to focus on their priorities.

About Armor

Armor is a global cybersecurity software company that simplifies protecting data and applications in private, public or hybrid cloud environments. Armor Anywhere provides technology to detect and respond to threats and can be activated in minutes.  Armor also helps organizations comply to major regulatory frameworks and controls. Armor combines workload protection, analytics from cloud-native sources, and other security data to provide unparalleled insight into threats facing organizations. Armor’s cybersecurity experts monitor customer environments 24/7/365 and if an attack takes place, helps customers respond quickly and effectively. Armor protects over 1000 customers in over 40 countries. To learn more, visit  www.armor.com or follow @armor on Twitter.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
IoT Vulnerability Disclosure Platform Launched
Dark Reading Staff 10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15270
PUBLISHED: 2020-10-22
Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not pa...
CVE-2018-21266
PUBLISHED: 2020-10-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2018-21267
PUBLISHED: 2020-10-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2020-27673
PUBLISHED: 2020-10-22
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
CVE-2020-27674
PUBLISHED: 2020-10-22
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.