Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

1/13/2011
02:36 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

St. Bernard Software Relaunches As EdgeWave

Name change reflects expanded portfolio of SCM solutions and services

San Diego, CA – January 13, 2011 – St. Bernard Software, Inc. (OTCBB: SBSW), a leader in Secure Content Management (SCM) solutions, today announced the official re-launch of the company as EdgeWave™, reflecting an expanded portfolio of SCM solutions and services, including web and email security, data protection, e-reputation, and email, all delivered through a choice of on-premise, on-demand, or custom hybrid deployments.

“The company has evolved dramatically over the past 12 months, and we are rebranding ourselves to reflect our broader mission that builds on our strong web and email security foundation,” said Lou Ryan, CEO and Chairman of the Company. “Over the past year, we’ve taken significant steps to enhance our senior leadership team and increase our talent pool, upgrade our existing products, expand our technology portfolio, overhaul our go-to-market strategy, and achieve greater cost efficiencies. We believe all of these efforts will produce greater customer satisfaction and increase business growth and shareholder value over the long term.”

The company’s move to re-brand itself as EdgeWave caps an aggressive transformation strategy, including the recent acquisition of substantially all of the assets of Red Condor, the hiring of five seasoned executives, streamlining operations into a new worldwide headquarters facility, a re-tooling of the company’s back office operation, the formulation of a powerful new technolog portfolio, and the expansion into new markets with new products.

“As a leading global distributor of security solutions and a long-time partner, the EdgeWave portfolio of SCM solutions will be a valuable addition to our web, email, and data security offerings” said Scott Griffin, Sales Executive at Trebron Company Inc. “The combination of the company’s award winning technology and price performance is a perfect fit with our mid-enterprise customers.”

About St. Bernard Software, Inc. dba as Edgewave™ EdgeWave™ (OTCBB: SBSW.OB) develops and markets on demand, onpremises, and hybrid Secure Content Management (SCM) solutions to the midenterprise and service provider markets. The EdgeWave portfolio of web, email and data protection technologies delivers comprehensive secure content management with unrivalled ease of deployment and the lowest TCO on the market. The company’s award winning iPrism Web Security and Red Condor Email Security products are now complemented by new e-reputation, email archiving and data leakage protection solutions, and can be delivered as hosted, on-premises, and hybrid services. With 6,500 customers worldwide, EdgeWave strives to deliver simple, high performance solutions that offer excellent value.

Based in San Diego, California, EdgeWave markets its solutions through a network of value added resellers, ISP’s and MSP’s, distributors, system integrators, OEM partners and directly to end users. For more information about EdgeWave, visit www.edgewave.com

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15505
PUBLISHED: 2020-07-07
MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1, and Sentry before 9.7.3 and 9.8.x before 9.8.1, allow remote attackers to execute arbitrary code via unspecified vectors.
CVE-2020-15506
PUBLISHED: 2020-07-07
MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1 allow remote attackers to bypass authentication mechanisms via unspecified vectors.
CVE-2020-15507
PUBLISHED: 2020-07-07
MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1 allow remote attackers to read files on the system via unspecified vectors.
CVE-2020-15096
PUBLISHED: 2020-07-07
In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affecte...
CVE-2020-4075
PUBLISHED: 2020-07-07
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not ...