Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/1/2013
08:05 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Support.com Offers SUPERAntiSpyware For Business

SAS for Business includes a central management console for deploying and managing SUPERAntiSpyware client software

Redwood City, CA – April 30, 2013 – Support.com (NASDAQ: SPRT), a leading provider of cloud-based technology services and software, today announced the release of SUPERAntiSpyware® (SAS) for Business. SAS for Business includes a central management console for efficiently deploying and managing SUPERAntiSpyware client software on desktops in business environments.

"SUPERAntiSpyware for Business has made it possible for Portage Community Bank of Ravenna, Ohio to take full advantage of the outstanding spyware and malware protection provided by SUPERAntiSpyware," said Charles Bevan, IT Specialist at Portage Community Bank. "With the central management console, we're able to quickly deploy SUPERAntiSpyware to our employee desktops and provide our IT staff with the tools they need to manage our desktops efficiently."

The central management console included in SAS for Business provides a number of benefits for businesses:

Enables IT administrators to control scan schedules and configuration policies corporate-wide and for individual desktops.

Delivers automated alerts when specific threats and malware are detected and includes customizable settings for email notifications and desktop health reports.

Supports automated responses to specific threats to help protect organizations from repeated attacks and chronic end point re-infection.

Automates SAS client updates, helping IT manage costs by reducing the time spent on software updates and drive compliance with security policies by keeping end points up-to-date.

"Mitigating the risk and downtime of cyber-attacks is increasingly important for businesses," said Support.com CEO Josh Pickus. "SUPERAntiSpyware for Business enables businesses to efficiently deploy and manage one of the best reviewed and most effective anti-malware / anti-spyware products on the market. SUPERAntiSpyware for Business is part of a comprehensive suite of offerings for small businesses from Support.com, including workstation setup and support, proactive server and network monitoring and management, business-class backup and recovery and cloud-based services."

SAS for Business is available directly from http://www.superantispyware.com/ or via Support.com channel partners, which include communication providers, retailers, technology companies and others.

About Support.com

Support.com, Inc. (NASDAQ: SPRT) is a leading provider of cloud-based technology services and software. We help leading brands create new revenue streams and deepen customer loyalty through programs that enhance their customers' technology experience. Our solution includes a comprehensive Service Delivery Platform, mobile and desktop apps, a scalable workforce of technology specialists and proven expertise in program design and execution. Our partners include many of the nation's leading communications providers, retailers and technology companies. For more information, please visit us at: www.support.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4931
PUBLISHED: 2021-02-24
IBM MQ 9.1 LTS, 9.2 LTS, and 9.1 CD AMQP Channels could allow an authenticated user to cause a denial of service due to an issue processing messages. IBM X-Force ID: 191747.
CVE-2020-11987
PUBLISHED: 2021-02-24
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
CVE-2020-11988
PUBLISHED: 2021-02-24
Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
CVE-2021-21974
PUBLISHED: 2021-02-24
OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in...
CVE-2021-22667
PUBLISHED: 2021-02-24
BB-ESWGP506-2SFP-T versions 1.01.09 and prior is vulnerable due to the use of hard-coded credentials, which may allow an attacker to gain unauthorized access and permit the execution of arbitrary code on the BB-ESWGP506-2SFP-T (versions 1.01.01 and prior).