Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/10/2014
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ControlScan Brings UTM to the SMB

Managed security services, Unified Threat Management technology combine to relieve IT security burden

ATLANTA, Sept. 10, 2014 -  ControlScan announces the general availability of its newest cloud-based managed security service, designed to help small and mid-sized businesses (SMBs) cost-effectively protect their IT networks from the continuous barrage of attacks by malware, trojans and viruses. The ControlScan ProTect Unified Threat Management (UTM) service delivers layered security that combines the company’s deep expertise and high-touch support with the exceptional protection of a UTM security appliance with firewall; advanced intrusion detection and prevention; anti-virus, anti-spam and anti-malware; content filtering and VPN capabilities.  

 “IT security is a complex undertaking for any size business, but the related time, mindshare and financial investment can place a tremendous burden on the SMB,” said Jyothish Varma, senior director of security product strategy, ControlScan. “SMBs are required to maintain the same level of data security as a larger corporation, yet with fewer resources and a smaller IT staff. Managing security on their own, including meeting government regulations and industry standards, is a big headache.” 

“Information security is one of many operational components within our franchising business,” said Marcos Cano, network engineer at South Bend, Ind. based HMR Acquisition. “Entrusting that component to the security and compliance experts at ControlScan helps us focus on what’s core to our business and at the same time, maintain a strong security posture.” 

Unlike many other UTM providers, ControlScan does not simply deliver a device and walk away. Following the Managed Security Service Provider (MSSP) model, the experts at ControlScan engage with existing IT staff to serve as a single, reliable security resource and trusted advisor. The company ensures that its UTM solution is fully and accurately implemented and then follows through by offering continuous network monitoring and security support.

“Working with ControlScan gives us a dedicated IT security team and enterprise-class security, without the expenses and operating costs associated with hiring additional full-time staff and purchasing costly, complex equipment,” Cano said.

ControlScan manages its ProTect Unified Threat Management service through a centralized platform in the cloud, enabling scalability from small branches to large networks. The solution is currently in use with a variety of SMBs, including multi-location businesses. For more information, visit ControlScan.com or call 800-825-3301.
###
                                                                  
About ControlScan                                           
Headquartered in Atlanta, ControlScan delivers integrated security and compliance solutions that help small and mid-sized businesses secure sensitive data and comply with information security and privacy standards. We support business owners, franchisees and merchant service providers with technology, services and expertise for PCI DSS, HIPAA and EI3PA compliance; vulnerability detection and risk mitigation; POS, e-commerce and mobile security; and more. For more information, please visit www.ControlScan.com or call 800-825-3301.
                                         
Please click here to immediately access the full release on ControlScan.com: https://www.controlscan.com/press-releases.php?releaseid=

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.