Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/27/2010
04:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Solear Donates Network Forensics Appliances To Colleges, Universities, Training Organizations

Company donates network forensics appliances to cyberdefense training programs

SALT LAKE CITY, UT – MAY 26, 2010 – Solera Networks, a leader in network forensics products and services today announced their “Donate and Defend” program to provide their award-winning network forensics technology to education institutions with dedicated cyber security training programs. Colleges, universities, and other training organizations may license the Solera DS Virtual Network Forensics Appliance free of charge to train professionals and fill the fast-growing demand for cyber security and network forensics experts.

“Today’s attackers are finding ways around traditional security protections and are penetrating even the most recognizable government agency and enterprise networks,” said Casey O’Brien, Director of CyberWatch, a consortium of 50+ colleges and universities devoted to information assurance and cyber security training. “A new, highly-skilled cyber defender is needed, one that can react quickly with the right set of skills and tools to identify previously unknown threats and to prevent ongoing exposure and risk. Solera Networks is a great example of a cutting-edge technology company that understands the need to support the development of the next generation of cyber warriors.”

Network forensics has become a key weapon in the cyber security arsenal of both military and enterprise security professionals, enabling rapid response to any security event. Acting like a camera in a bank, when a cyber attack occurs, network forensics solutions provide a complete record of all network activity to help determine the point of entry for the breach, what was affected, what data was compromised and the party that was responsible — even in real-time. Solera Networks supports cyber defense training exercises, such as the Collegiate Cyber Defense Competition (CCDC). The Donate and Defend program further extends that support to educate and train new network forensics professionals.

“Securing critical enterprise trade secrets and national security information requires swift, intelligent response,” said Steve Shillingford, President and CEO of Solera Networks. “Cyber attacks not only threaten our national interests, they also have a huge economic impact. We have to prepare and train future professionals in order to respond swiftly and appropriately as new threats emerge. We are happy to play a role in assisting with this education.”

Program Details:

Solera Networks will donate its Solera DS Virtual Network Forensics Appliance (a $10,000 value) to any education or training institution that offers dedicated network forensics curriculum and cyber security training courses. Solera DS forensics appliances and the Solera DeepSee Forensics Suite provide unique capabilities to better train cyber defenders, including:

* Full recording and replay of all network activity – See every event that transpires on the network and replay events for ongoing “what if” analysis. * Integration with popular networking security tools – Provides context to other security tools, helping answer questions like: “What triggered this security alert?”, “What were the attackers doing before and after the alert?” and, “Were there previous instances of this same event?” * Easy deployment into any network environment – Virtual and physical deployment options allow for simple deployment, even in the most complex networks. Scalable storage options allow recording of days, weeks, or month’s worth of network activity.

Any educational institution interested in using these network forensics appliances may contact Solera Networks for program specifics. Visit www.soleranetworks.com/dnd for more details.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...