Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/11/2012
03:13 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wurldtech Achilles Test Software Now Available For Development Engineers Of Mission-Critical Embedded Devices

Solution is software version of Achilles Test Platform

VANCOUVER, British Columbia, Sept. 5, 2012 /PRNewswire/ -- Wurldtech Security Technologies, leaders in protecting mission-critical connected devices from persistent and dynamic cyber security threats, today announced the release of its Achilles Test Software, the software version of its Achilles Test Platform, extending its Achilles Test family of cyber security testing products to development teams of mission critical embedded devices.

Significant SCADA cyber attacks are plaguing the industry. Industrial Control Systems have evolved into complex, open, inter-connected networks, creating significant challenges for developers and manufacturers of mission-critical devices that are at the core of nuclear power plants, oil refineries, smart grids and medical applications.

"The Achilles Test Software is the next step in elevating industry standards to protect mission-critical connected devices from persistent cyber security threats," said Wurldtech CTO and co-founder, Nate Kube. "Our goal is to provide a complete cyber security solution supporting the entire product lifecycle, from development to commissioning, implementation and operation of critical infrastructure, ensuring the delivery of secure products, increased ROI and protection of brand equity for both the device manufacturer and their customers."

Achilles Test Software delivers the tools that development teams require to test critical software early in the development cycle, before they enter the QA lab.

It provides the means to proactively expose and correct vulnerabilities and validate system resiliency in a real-time environment, before the products are released and deployed in high-availability process control networks.

The Achilles Product Portfolio - Analyze, Discover, Mitigate and Certify

Wurldtech provides a total set of analysis, software, hardware and certification products that provide stakeholders with a set of tools to protect and mitigate against Zero-Day threats, malware and cyber attacks.

-- Achilles Test Software- Previously available only as a comprehensive

appliance - Achilles Test Platform, Achilles Test Software puts Achilles

testing in the hands of development and quality assurance (QA) teams,

enabling a corporate and strategic focus to cyber testing by allowing

for candidate software and hardware testing earlier in the development

cycle.

-- Achilles Test Platform- Hardware platform designed as a universal test

bench to allow equipment manufacturers of all sizes to conduct

comprehensive security and robustness testing throughout the product

development lifecycle. Engineers can now utilize Achilles Test Software

to test for device vulnerabilities at the earliest stage of development,

using Achilles Test Platform for final verification testing.

-- Achilles Communication Certification- Verifies network robustness of

industrial control devices by subjecting the device to a standardized

set of network tests. Certification is provided by Wurldtech engineering

teams upon inspection of testing data.

-- Achilles Practices Certification- Valued-added program tailored to the

needs of system owners and operators, verifies the device manufacturers

security practices and procedures across the product's lifecycle.

About Wurldtech Security Technologies

Founded in 2007, Wurldtech is a software company providing protection for mission critical connected devices against the persistent and dynamic threat of cyber attack. Wurldtech follows our customers' security lifecycle by providing innovative assessment products to discover and analyse threat and vulnerability profiles; mitigation of known vulnerabilities in installed networks with Achilles Threat Intelligence Signatures and device and development practice certification through Achilles Certification. Wurldtech's internationally recognized cyber security experts help industrial stakeholders identify and mitigate cyber security vulnerabilities to reduce the risk and cost of attacks.

Global customers worldwide spanning Oil & Gas, Electric Power, Medical, Nuclear, Chemical and Water Treatment markets currently use Wurldtech solutions. Visit wurldtech.comfor more information.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.