Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/27/2011
02:12 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wedge Networks BeSecure Stops Web 2.0 And Social Media-Borne Malware Attacks

BeSecure Web security appliance scans and secures sensitive information coming in and out of Web 2.0 and social media networks

CALGARY, Alberta, June 22, 2011/PRNewswire/ -- Wedge Networks, an innovator providing remediation-based Deep Content Inspection for high-performance, network-based Web security, announced today that its BeSecure Web security appliance scans and secures sensitive information coming in and out of Web 2.0 and social media networks, to protect against malware transmissions, data loss and blended threats.

A recent study showed that 84 percent of organizations are increasing their use of Web applications, including more employees using Web 2.0 and social media websites for both work and non-work related activities. With the combination of user generated drive-by attacks on good websites and potential access through multiple endpoints, website blocking and application control policies are outdated and ineffective.

The Wedge Networks BeSecure Web gateway ensures real-time security enforcement when accessing dynamic web applications. With BeSecure, organizations can be confident that malicious code is blocked, allowing access only to clean content.

News Facts:

BeSecure provides:

-- Clear visibility of the application content and the ability to apply flexible policies over users, applications and protocols based on real-time comprehension of the intent of applications. -- Deep Content Inspection (DCI) with inline real-time web traffic analysis and threat detection and remediation for all endpoints, eliminating malware infested downloads and injection attacks. -- Peace of mind that internal policies and archiving systems extend to Web 2.0 and social media websites and applications, maintaining compliance. -- Data filtering and content scanning capabilities that accurately monitor and control sensitive data transmitted in web, email, and network applications.

Supporting Quotes:

-- Hongwen Zhang, president and CEO, Wedge Networks, said:"Today, social media has more than ever become an interactive tool for business to consumer communication, creating an increase in risk of data loss over unsecured networks. Recent studies show that social networking sites are 10 times more effective at delivering malware than previous methods of email delivery. Since prohibiting social media usage by employees is unrealistic, IT departments must find a way to maintain enterprise security without affecting the end-user's experience. The high performance architecture of Wedge Networks BeSecure Web gateway provides Deep Content Inspection to eliminate content based attacks and accurately monitors and controls the transmission of sensitive data. While complying with the same regulations governing e-mail and the static web, BeSecure is able to safely protect organizations from risky social media threats." -- Scott Crawford, research director, Enterprise Management Associates, said:"Social media sites like Facebook, Twitter and LinkedIn can provide great value to employees in the workplace, but unfortunately, this increased value comes with increased risk. Deep inspection-based security platforms that permit clean content, like Wedge Networks BeSecure, offer greater benefits to the organization by scanning and securing content coming in and out of the network to protect against malware transmissions, data loss and blended threats."

About Wedge Networks

Wedge Networks is an innovator providing remediation-based Deep Content Inspection for high-performance, network-based Web security. It provides a scalable, real-time solution that understands the intent of Data-in-Motion, enabling the detection and remediation of both known and novel threats without impacting network performance. Its BeSecure appliances are easily integrated into existing environments. Wedge Networks provides its global customers, partners and distributors a dramatically safer and innovative way to do business. For more information, visit www.wedgenetworks.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.