Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

7/27/2009
04:06 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

netForensics Reports Strong Growth Q2 2009

Acquisition of High Tower Software's SIEM technology helps drive growth

EDISON, N.J., July 23 /PRNewswire/ -- netForensics, Inc. a leader in the Security Information Management market, today announced that it concluded the second quarter having added dozens of new customers growing the company's worldwide customer base to over 550.

Since acquiring High Tower Software's SIEM technology in February '09 (now nFX Cinxi One), netForensics has experienced strong growth in the appliance market from customers looking for an affordable technology of SIM and log management in one appliance. "Historically many customers have had to choose between log management and security information and event management solutions," said Dale Cline, President and CEO of netForensics. "With nFX Cinxi One, customers get both log management capabilities with powerful correlation technology and real-time monitoring in one box."

In addition to the growth of nFX Cinxi One, netForensics' second quarter highlights included:

-- Continued double digit revenue growth and profitability in Q2 2009.

-- Addition of over 50 new nFX Cinxi One customers to the netForensics family of clients.

-- Leading Analyst recognitions; Gartner recognized netForensics as a "visionary" provider of SIEM solutions in its 2H '09 report on the SIEM market and Forrester recognized netForensics for possessing all features identified as key to SIM solutions.

-- Leadership team expansion; Appointed Dave Steidle as Vice President of Technology to drive product vision and enhancements.

-- Accolades for nFX SIM One; Info Security Products Guide awarded netForensics' nFX SIM One the "2009 Global Excellence Award Winner," demonstrating that netForensics is ahead of the curve when it comes to the best-of-the-best products for ensuring the security of an organization.

"This has been a very significant quarter for netForensics from both a technology and customer perspective," said Dale Cline, President and CEO of netForensics. "With our nFX Cinxi One appliance gaining wide adoption in the appliance market and our core nFX SIM One product continuing to be recognized as the premier enterprise SIM solution, it is further evidence of our ability to execute on our vision and provide the highest level of satisfaction to our customers."

About netForensics

netForensics delivers security compliance management solutions that help stop the ever-increasing attacks that threaten organizations. Through its patented nFX technology, netForensics not only solves security compliance challenges, but provides the proof needed to address the myriad of regulatory and internal governance requirements. The netForensics' suite of nFX One products provides solutions to address external and internal threats, mitigation, log management and reporting. Governments and companies of all sizes around the world rely on netForensics to gain unparalleled information security management visibility, prevent costly downtime, and maintain compliant operations. For more information, visit: http://www.netforensics.com/.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17505
PUBLISHED: 2020-08-12
Artica Web Proxy 4.30.000000 allows an authenticated remote attacker to inject commands via the service-cmds parameter in cyrus.php. These commands are executed with root privileges via service_cmds_peform.
CVE-2020-17506
PUBLISHED: 2020-08-12
Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
CVE-2020-2035
PUBLISHED: 2020-08-12
When SSL/TLS Forward Proxy Decryption mode has been configured to decrypt the web transactions, the PAN-OS URL filtering feature inspects the HTTP Host and URL path headers for policy enforcement on the decrypted HTTPS web transactions but does not consider Server Name Indication (SNI) field within ...
CVE-2020-5415
PUBLISHED: 2020-08-12
Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerabilit...
CVE-2020-6653
PUBLISHED: 2020-08-12
Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's ac...