Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/12/2011
04:40 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Norman Offers Advanced Automated Solution For Patching Software Vulnerabilities

Norman Patch and Remediation Version 7 offers vulnerability audits and remediation

FAIRFAX, Va., May 12, 2011 /PRNewswire/ -- A universal law enforcement axiom states that criminals prefer to trespass through vulnerable open or unlocked doors or windows. In the IT and software industries, the same rule prevails.

Approximately nine in 10 cyber attacks exploit known computer security flaws.

Criminals using malicious software prefer the easy path: attacking client-side software that is vulnerable because software patch management is out of date, often by months and even years, leaving computers wide open. For example, for months the Conficker worm continued to spread to millions of computers worldwide through a security hole in Windows Server Service -- despite Microsoft publishing a patch for this vulnerability.

Unpatched email and other ubiquitous desktop productivity applications are an open invitation to criminal botnets -- often resulting in expensive losses and damage for IT departments. Nearly two dozen software vulnerabilities are discovered each day (http://www.norman.com/products/patch_remediation/en-us), so IT departments need to make patching a top priority.

Norman, a leading security company offering products protecting SMB, enterprise and government networks and consumer desktops, today announced that Norman Patch and Remediation Version 7 offers the latest automated vulnerability and patch management capabilities available.

"Norman Patch and Remediation is the premier vulnerability management solution that addresses the major OS platforms plus the most used third-party applications, all from a state-of-the-art console," said Audun Lodemel, vice president, marketing. "This solution significantly reduces the exposure to cybercriminals and malware risk while decreasing the cost of endpoint operations and compliance reporting requirements."

Norman Patch and Remediation delivers:

* Vulnerability audits and remediation with support across major operating systems, including Microsoft Windows, Linux, MacOS, Sun Solaris and HP, allowing risk to be managed in the most complex IT environments -- from a single console * Rapid, accurate and secure patch management for popular applications from vendors such as Microsoft, Adobe and Apple * A console that provides web-, role- and workflow-based navigation to simplify and optimize endpoint operations * Comprehensive patch, remediation and configuration capabilities * Continuous monitoring and enforcement

For more information on Norman Patch and Remediation, and other vulnerability management solutions, please visit http://www.norman.com/products/.

About Norman ASA

Founded in Norway in 1984, Norman ASA is a global leader and pioneer in proactive content security solutions and forensics malware tools. Norman's proactive antimalware solutions, including malware analysis tools, network security and endpoint protection, are powered by patented Norman SandBox' technology and used by security solutions providers around the world.

Norman's unified core antimalware protection for clients, servers and network security are delivered as products and services designed to protect business communications and resources, including corporate and government networks and applications, remote employees, branch offices and extranets. Norman's solutions are available through Norman subsidiaries and a network of global partners. For more information, visit www.norman.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
CVE-2020-26890
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...