Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

1/27/2016
10:20 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

iSheriff Introduces Complete Cloud-Based Security Solution

iSheriff Complete Replaces Three Point Products Covering Web, Email and Endpoint Security

Redwood Shores, Calif. – January 27, 2016iSheriff, a leading cloud security company, today announced the release of iSheriff Complete, a comprehensive cyber security platform designed to provide 360-degree protection of an organization’s devices and communication channels. iSheriff Complete is the industry’s first comprehensive cloud security platform that provides fully-integrated endpoint, Web and email security, delivered through a single Web-based management console with a single set of enforceable security policies.

“In order to provide a secure network, a security manager must be able to effectively see and control all communications in and out of that network,” said John Mutch, CEO, iSheriff. “iSheriff Complete provides superior malware protection and complete control of Web, email and endpoint vectors, providing the only integrated, cloud-based security platform available today. We deliver complete cyber security through the cloud, all controlled by a single, easy to use interface. iSheriff Complete implements security policies and schedules reports in minutes, so our customers can get back to running their business.”

As a cloud-based platform, iSheriff removes potential malware and viruses before they ever reach our customers’ network via Web or email communications.  The company provides a “clean feed” to customers of their email and Web traffic.

iSheriff Complete includes:

Endpoint, Web & Email

Complete vector control and visibility is central to the power of iSheriff’s platform. “Best of breed” point products do not work together to create a security system as iSheriff does.  iSheriff Complete is designed to enforce common security policies across vectors, as well as track users both on and off the network.

Threat Detection Engine

Working 24/7/365 to stay ahead of the latest cyber threats on a worldwide basis.  The core of iSheriff’s security operates around the globe, detecting new threats, developing new signatures and propagating those in a matter of seconds.

Active Response Console

The console is where it all happens.  Designed to be easy to use, iSheriff’s interface allows organizations to control their entire cyber security system from one interface.  Instantly displays what threats are seen and what actions you have taken.  Policies come alive with iSheriff.

“We’re in an age of fast-moving change and innovation powered by connected mobile devices and cloud computing. This has opened up the influence of technology to everyone, including criminals,” Mutch continued. “Cloud-based services and software of all varieties have been broadly adopted. By eliminating the need for complex and expensive hardware and software installation and offering scalable, per user pricing, cloud-based platforms open access to services that were previously cost-prohibitive for many businesses.”

iSheriff is one of the leading companies providing effective security completely from the cloud. The company delivers the industry’s easiest to deploy and manage Software-as-a-Service (SaaS) solution for protection against today’s multi-vector threats and compliance challenges, combining the power, flexibility and ease of a cloud-based service offering with a seamlessly integrated suite of critical technologies. For more information on iSheriff, please visit www.isheriff.com and follow the company on Twitter at @isheriffinc.

About iSheriff

iSheriff is a leading cloud-based, enterprise device security platform used by more than 3,000 organizations around the world. Our global cloud network, award winning security, and SaaS delivery model provide an integrated service to protect all enterprise devices – including laptops, servers, tablets, point of sale devices, industrial equipment and emerging “internet of things” technologies. Simply put, iSheriff delivers more powerful security that is easier to manage and more cost efficient than our competition. We are proud to be recognized by leading analysts and industry publications, including SC Magazine, Network Computing and IDC. In February 2015, Virus Bulletin's VB100 independent comparative testing named iSheriff the most effective solution against new and emerging malware.

For more information on iSheriff, please visit www.isheriff.com and follow the company on Twitter at @isheriffinc.

 

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14174
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to view titles of a private project via an Insecure Direct Object References (IDOR) vulnerability in the Administration Permission Helper. The affected versions are before version 7.13.6, from version 8.0.0 before 8.5....
CVE-2019-20901
PUBLISHED: 2020-07-13
The login.jsp resource in Jira before version 8.5.2, and from version 8.6.0 before version 8.6.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect in the os_destination parameter.
CVE-2019-20898
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to access sensitive information without being authenticated in the Global permissions screen. The affected versions are before version 8.8.0.
CVE-2019-20899
PUBLISHED: 2020-07-13
The Gadget API in Atlassian Jira Server and Data Center in affected versions allows remote attackers to make Jira unresponsive via repeated requests to a certain endpoint in the Gadget API. The affected versions are before version 8.5.4, and from version 8.6.0 before 8.6.1.
CVE-2019-20900
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the Add Field module. The affected versions are before version 8.7.0.