Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/2/2020
11:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Armor Upgrades Armor Anywhere Threat Detection and Response Technology

New features include the flexibility to turn security capabilities on and off, and easily ingest log data from other sources.

Dallas, TX, June 2, 2020 —Armor®, a leading global cybersecurity software company that protects workloads in public, hybrid and private cloud environments, announced today that it has released a major upgrade to its flagship product, Armor Anywhere. With these latest enhancements, Armor delivers stronger threat detection and response while giving its customers  greater operational control over their security.

Some of the new features in Armor Anywhere include the flexibility to turn security capabilities on and off, and easily ingest log data from other sources,  making it one of the most flexible platforms on the market. New security capabilities include the addition of Intrusion Prevention, as well as Policy Recommendation Scans that suggest and automatically implement policies to enhance the security posture of an end user’s environment. Armor has also added features designed to streamline processes for DevOps users and security analysts.

“With these new capabilities and enhancements to Armor Anywhere, we can now ingest and analyze even more data from a wide variety of sources, providing  better protection for our customers,” said Mark Woodward, Armor CEO. “We’ve also added key improvements in how customers can visualize their data and manage their security environments. We are extremely excited about the advancements this new release brings to our customers.”

New Armor Anywhere Features

  • Intrusion Prevention System (IPS)

Armor Anywhere now provides Intrusion Prevention, as well as Intrusion Detection, so customers can detect and block cyber threats.

  • Policy Recommendation Scans

Armor scans the hosts’ operating system, installed applications, Windows registry, open ports, directory listings, file system, any running processes and services. If vulnerabilities or outdated rules are detected, recommended policy changes will be provided to the customer or the customer can choose to have those changes automatically implemented.

  • Log and Data Management

Armor can ingest additional log sources to be analyzed and correlated against threats. These sources include event logs from cloud-native sources, network appliances and security devices. With the Log Search and Visualization feature, customers can do deep querying and analysis, create custom dashboards, and produce charts, graphs and custom reports of their data sets.  Armor has also added Security Incident Connectors so that a  security event or incident, discovered by Armor, can easily be ingested  and analyzed by the customer’s internal security tools.   

  • Operational Control  

Armor’s customers can turn on or off any security features, using the Command Line Interface (CLI). This can be done for one virtual machine or can be done across multiple virtual machines at the same time. Customers can also use the “Toolbox” feature to schedule or automatically deploy the CLI command in their environment.

Combined, these new features and enhancements enable Armor to see more, ingest more, analyze more and block more for its customers. It also enables Armor’s customers to better scale and adapt their security to meet their business needs. As a result, these organizations’ assets are better protected, allowing them to focus on their priorities.

About Armor

Armor is a global cybersecurity software company that simplifies protecting data and applications in private, public or hybrid cloud environments. Armor Anywhere provides technology to detect and respond to threats and can be activated in minutes.  Armor also helps organizations comply to major regulatory frameworks and controls. Armor combines workload protection, analytics from cloud-native sources, and other security data to provide unparalleled insight into threats facing organizations. Armor’s cybersecurity experts monitor customer environments 24/7/365 and if an attack takes place, helps customers respond quickly and effectively. Armor protects over 1000 customers in over 40 countries. To learn more, visit  www.armor.com or follow @armor on Twitter.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Average Cost of a Data Breach: $3.86 Million
Jai Vijayan, Contributing Writer,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15109
PUBLISHED: 2020-08-04
In solidus before versions 2.8.6, 2.9.6, and 2.10.2, there is an bility to change order address without triggering address validations. This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the ship...
CVE-2020-16847
PUBLISHED: 2020-08-04
Extreme Analytics in Extreme Management Center before 8.5.0.169 allows unauthenticated reflected XSS via a parameter in a GET request, aka CFD-4887.
CVE-2020-15135
PUBLISHED: 2020-08-04
save-server (npm package) before version 1.05 is affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version version 1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version. This is patched by implementing Double submit. The CSRF...
CVE-2020-13522
PUBLISHED: 2020-08-04
An exploitable arbitrary file delete vulnerability exists in SoftPerfect RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can allow an unprivileged user to delete any file on the filesystem. An attacker can send a malicious IRP to trigger this vulnerability.
CVE-2020-15943
PUBLISHED: 2020-08-04
An issue was discovered in the Gantt-Chart module before 5.5.4 for Jira. Due to a missing privilege check, it is possible to read and write to the module configuration of other users. This can also be used to deliver an XSS payload to other users' dashboards. To exploit this vulnerability, an attack...