Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/28/2010
10:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CoreTrace Launches User-Focused Application Whitelisting Tool

BOUNCER 6.0 features intuitive administration and application intelligence

Austin, Texas July 28, 2010 CoreTrace, the leading provider of secure and flexible application whitelisting solutions, announced today a powerful new version of its flagship product, BOUNCER 6.0. New functionality, including intuitive administration and application intelligence, positions CoreTrace at the forefront of application whitelisting innovation and offers enterprises an even easier to implement and maintain solution, leading to significant time and money savings. Despite application whitelisting's clear security advantages over traditional approaches, some IT professionals have delayed adoption because of concerns around scalability and operational limitations, said Toney Jennings, president and CEO of CoreTrace. BOUNCER has always been one of the most secure application whitelisting solutions. With version 6.0, BOUNCER has improved scalability and is now the most flexible solution too, including the industry's simplest approach to adding new applications with the most relevant application intelligence. One marquee feature of this release is "application intelligence" including the new CoreTrace Software Intelligence (CSI) service. Administrators receive intelligence about installed and requested applications, including prevalence, usage, and "application assurance" information on both "known good" and "known bad" (malware) applications. Another marquee feature of 6.0 is intuitive, transparent administration that is built upon CoreTrace Trusted Change technology. CoreTrace has added options for user privileges called BlockQ and AllowQ. When attempting to run an application that has not been previously approved or automatically authorized via other Trusted Change mechanisms, designated BlockQ users receive a notification that prompts them to provide a simple business justification for the application. Designated AllowQ users receive a similar notification, but they have the ability to temporarily run the application until IT can approve or deny adding it to the whitelist. These two new flexible user models facilitate easy installations and requests that drop right into a queue for administrators to approve or reject at will. Combined with a broad set of application intelligence tools, IT and security administrators can make more informed decisions and more easily manage the constantly-changing application needs of an enterprise endpoint. Though whitelisting has long shown great potential, it may now be entering a new phase of maturity as leaders such as CoreTrace match its power to contain risk with the expanded ability to adapt to the realities of enterprise management, said Scott Crawford, Research Director for Enterprise Management Associates. By taking the bull by the horns and integrating adaptive change control directly into BOUNCER, CoreTrace expands its leadership stake in defining trusted change for applications. Additional features of BOUNCER 6.0 by CoreTrace also include:

  • Advanced security including memory protection, script controls, malware removal and self-defending endpoints.
  • Improved deployment and scalability - shipping as a virtual appliance, and utilizing industry-standard architectural and open source components.
  • Improved integration capabilities - addition of a client API to facilitate easier integrations into third party management systems. BOUNCER 6.0 will ship in August 2010. Pricing starts at $35 per desktop.

    About CoreTrace

    CoreTrace' is the leading provider of secure and flexible application whitelisting solutions. The companys award-winning and patented BOUNCER solution is at the forefront of the movement in next-generation endpoint control and security solutions. Unlike other application whitelisting solutions that are simply lockdown technologies, BOUNCERs Trusted Change capability enables IT professionals to predefine multiple sources from which users can safely install applications and have them automatically added to the whitelistall with minimal IT involvement. The result: full prevention of unauthorized applications, improved overall security, and lower total cost of ownership. CoreTraces customers include organizations in a wide variety of industries, such as energy, oil and gas, retail, financial services, telecommunications, as well as government agencies.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Manchester United Suffers Cyberattack
    Dark Reading Staff 11/23/2020
    As 'Anywhere Work' Evolves, Security Will Be Key Challenge
    Robert Lemos, Contributing Writer,  11/23/2020
    Cloud Security Startup Lightspin Emerges From Stealth
    Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-20934
    PUBLISHED: 2020-11-28
    An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
    CVE-2020-29368
    PUBLISHED: 2020-11-28
    An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
    CVE-2020-29369
    PUBLISHED: 2020-11-28
    An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
    CVE-2020-29370
    PUBLISHED: 2020-11-28
    An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
    CVE-2020-29371
    PUBLISHED: 2020-11-28
    An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.