Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/27/2011
04:56 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wedge Networks BeSecure Aims To Protect Against Malware Outbreaks From Content Service

BeSecure provides deep content inspection for any type of application

CALGARY, ALBERTA May 18, 2011 Wedge Networks, an innovator providing remediation-based Deep Content Inspection for high-performance, network-based Web security, announced today that its BeSecure Web security appliance ensures mobile and online content providers are trusted sources for clean content.

Content providers are facing increasing pressure from ISPs, mobile operators and customers to provide content that is safe from malicious activity. With the rising number of smartphone and other mobile devices, demand for added content has increased. In 2011 alone, Gartner predicts that more than 17 billion apps will be downloaded. As downloads increase, content providers face the challenge of managing high volumes of inbound and outbound traffic.

The Wedge Networks BeSecure Web Security Gateway, running on the patented WedgeOS, goes beyond conventional deep content inspection by providing a scalable, real-time solution that understands the intent of Data-in-Motion, enabling the detection and remediation of both known and novel threats without impacting network performance. The award winning BeSecure Web security appliance provides the ability to detect, block and defend against Web-based malicious attacks that steal data, disrupt networks and damage credibility.

News Facts:

BeSecure provides:

Full Deep Content Inspection for any type of application including: HTTP, FTP, email and all executable files for all operating systems.

Inline anti-malware detection with behavioral analysis on web, email and FTP traffic, which provides threat detection for items such as webmail attachments, applications and software downloads.

Consolidation of many sources of threat intelligence across all communication protocols to stop malicious code regardless of its activation point.

High bandwidth with low latency malware scanning to deploy seamlessly into busy networks and uphold service level agreements.

Inbound and outbound security filtering to provide defense before content hits the internal network and malicious code propagates the consumer space.

A network based, anti-malware and anti-spam solution for multiple devices including: mobile phones, tablets, PDAs and PCs.

Supporting Quotes: Dennis Woronuk, president and COO, Wmode, said: Threats come from all fronts today: applications, the Web and email infrastructures that we use to develop, aggregate and distribute our mobile applications and content. We found that conventional network inspection technologies are unable to deliver the visibility, protection and manageability required to shape Internet traffic and secure IT infrastructure. With the implementation of the Wedge Networks BeSecure Web security appliance, we gained the unique ability to block these attacks from within downloadable applications for smartphones and tablets as well as across all Web and email protocols. The solutions ease-of-use and intelligent scanning and reporting capabilities make it an obvious choice for any organization looking to strengthen its computing infrastructure and services against malware threats. Hongwen Zhang, president and CEO, Wedge Networks, said: Today, more organizations than ever are experiencing fast emerging Web attacks, with recent studies showing that malware threats have increased by 300 percent since the beginning of 2009 alone. Many of these threats are delivered by users downloading content to their computing devices, be it downloading an app from the Android market or retrieving rich content from seemingly harmless sites. When this happens, end users and service providers are all hurt. With the Wedge Networks BeSecure solution, leading content service providers such as Wmode are finding that outbreaks have been completely eliminated. Easy to integrate into existing environments, BeSecure provides its global customers, partners and distributors a dramatically safer way to do business.

About Wedge Networks Wedge Networks is an innovator providing remediation-based Deep Content Inspection for high-performance, network-based Web security. It provides a scalable, real-time solution that understands the intent of Data-in-Motion, enabling the detection and remediation of both known and novel threats without impacting network performance. Its BeSecure appliances are easily integrated into existing environments. Wedge Networks provides its global customers, partners and distributors a dramatically safer and innovative way to do business. For more information, visit www.wedgenetworks.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.