Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

1/27/2016
10:20 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

iSheriff Introduces Complete Cloud-Based Security Solution

iSheriff Complete Replaces Three Point Products Covering Web, Email and Endpoint Security

Redwood Shores, Calif. – January 27, 2016iSheriff, a leading cloud security company, today announced the release of iSheriff Complete, a comprehensive cyber security platform designed to provide 360-degree protection of an organization’s devices and communication channels. iSheriff Complete is the industry’s first comprehensive cloud security platform that provides fully-integrated endpoint, Web and email security, delivered through a single Web-based management console with a single set of enforceable security policies.

“In order to provide a secure network, a security manager must be able to effectively see and control all communications in and out of that network,” said John Mutch, CEO, iSheriff. “iSheriff Complete provides superior malware protection and complete control of Web, email and endpoint vectors, providing the only integrated, cloud-based security platform available today. We deliver complete cyber security through the cloud, all controlled by a single, easy to use interface. iSheriff Complete implements security policies and schedules reports in minutes, so our customers can get back to running their business.”

As a cloud-based platform, iSheriff removes potential malware and viruses before they ever reach our customers’ network via Web or email communications.  The company provides a “clean feed” to customers of their email and Web traffic.

iSheriff Complete includes:

Endpoint, Web & Email

Complete vector control and visibility is central to the power of iSheriff’s platform. “Best of breed” point products do not work together to create a security system as iSheriff does.  iSheriff Complete is designed to enforce common security policies across vectors, as well as track users both on and off the network.

Threat Detection Engine

Working 24/7/365 to stay ahead of the latest cyber threats on a worldwide basis.  The core of iSheriff’s security operates around the globe, detecting new threats, developing new signatures and propagating those in a matter of seconds.

Active Response Console

The console is where it all happens.  Designed to be easy to use, iSheriff’s interface allows organizations to control their entire cyber security system from one interface.  Instantly displays what threats are seen and what actions you have taken.  Policies come alive with iSheriff.

“We’re in an age of fast-moving change and innovation powered by connected mobile devices and cloud computing. This has opened up the influence of technology to everyone, including criminals,” Mutch continued. “Cloud-based services and software of all varieties have been broadly adopted. By eliminating the need for complex and expensive hardware and software installation and offering scalable, per user pricing, cloud-based platforms open access to services that were previously cost-prohibitive for many businesses.”

iSheriff is one of the leading companies providing effective security completely from the cloud. The company delivers the industry’s easiest to deploy and manage Software-as-a-Service (SaaS) solution for protection against today’s multi-vector threats and compliance challenges, combining the power, flexibility and ease of a cloud-based service offering with a seamlessly integrated suite of critical technologies. For more information on iSheriff, please visit www.isheriff.com and follow the company on Twitter at @isheriffinc.

About iSheriff

iSheriff is a leading cloud-based, enterprise device security platform used by more than 3,000 organizations around the world. Our global cloud network, award winning security, and SaaS delivery model provide an integrated service to protect all enterprise devices – including laptops, servers, tablets, point of sale devices, industrial equipment and emerging “internet of things” technologies. Simply put, iSheriff delivers more powerful security that is easier to manage and more cost efficient than our competition. We are proud to be recognized by leading analysts and industry publications, including SC Magazine, Network Computing and IDC. In February 2015, Virus Bulletin's VB100 independent comparative testing named iSheriff the most effective solution against new and emerging malware.

For more information on iSheriff, please visit www.isheriff.com and follow the company on Twitter at @isheriffinc.

 

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4815
PUBLISHED: 2021-01-27
IBM Cloud Pak for Security (CP4S) 1.4.0.0 could allow a remote user to obtain sensitive information from HTTP response headers that could be used in further attacks against the system.
CVE-2020-4816
PUBLISHED: 2021-01-27
IBM Cloud Pak for Security (CP4S) 1.4.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-For...
CVE-2020-4820
PUBLISHED: 2021-01-27
IBM Cloud Pak for Security (CP4S) 1.4.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2020-4967
PUBLISHED: 2021-01-27
IBM Cloud Pak for Security (CP4S) 1.3.0.1 could disclose sensitive information through HTTP headers which could be used in further attacks against the system. IBM X-Force ID: 192425.
CVE-2020-36012
PUBLISHED: 2021-01-27
Stored XSS vulnerability in BDTASK Multi-Store Inventory Management System 1.0 allows a local admin to inject arbitrary code via the Customer Name Field.