Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12:52 PM
Dark Reading
Dark Reading
Products and Releases

CounterSnipe Technologies Upgrades Intrusion Prevention Software, Appliances

CounterSnipe protects from security threats with built in IDS/IPS, host identification, application and vulnerability discovery, correlation of attack to vulnerability data, and intelligent Alert Management

Boston, Jan 2009: CounterSnipe Technologies, the leading player in developing snort based Threat Management Systems is pleased to announce the latest release of its world class Intrusion Prevention Software thus delivering much superior and faster IDS/IPS appliances.

CounterSnipe appliances are delivered with extensive set of built in network security applications ensuring that they Auto-Adapt to protect the network they are attached to. Unlike any other traditional IDS/IPS system, a CounterSnipe appliance detects and protects the assets attached on your specific network, thus eliminating 99% of the false alerts commonly associated with IDS/IPS systems.

CounterSnipe software offers complete protection from security threats with built in IDS/IPS, host identification, application and vulnerability discovery, correlation of attack to vulnerability data, and intelligent Alert Management. CounterSnipe systems are designed to detect and prevent against real and most relevant security violations. The sophisticated alert management module eliminates unnecessary alerts associated with typical IDS/IPS systems.

"We have spent an enormous amount of time and resource in perfecting this latest release. We have enhanced the alert handling and analysis process. The usage of the all new database handler improves the speed of events access by many times than before," says Khirod Patra, CS lead developer. "Our systems can now handle, search through and analyse many millions of events in seconds. This combined with our unique way of updating the event count, results in much faster report generation too," adds Khirod.

CounterSnipe latest release is immediately available both as site licence and pre-configured appliances. The site licence based pricing offers customers the flexibility to build more than one IDS/IPS system at no additional software cost. The pricing for the new version starts at sub $5k.

In line with the CounterSnipe support agreement provisions, all existing customers with current maintenance/support agreements will be automatically upgraded to the latest release.

CounterSnipe products are marketed, sold and supported by trained, Accredited Resellers throughout the world. For further information or to test drive our systems please contact [email protected]

About CounterSnipe

CounterSnipe Technologies, expert in strategic security, offers a unique combination of software, services, and training to help organizations continuously and measurably protect the most important assets from the most critical threats. Through a strategic approach to security, the company identifies and implements the right balance of technology, people and process to manage digital risk and leverage security investments more effectively. By combining asset discovery, vulnerability scanning and IDS/IPS attack data CounterSnipe offers one of the most comprehensive Enterprise Threat Management systems on the market. For more information about CounterSnipe, visit www.CounterSnipe.com

Contacts: CounterSnipe Technologies, Claire Jenson [email protected]

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error page
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate filters on module layout settings could lead to an LFI.
PUBLISHED: 2021-04-14
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system funct...
PUBLISHED: 2021-04-14
An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send i...
PUBLISHED: 2021-04-14
AjaxSearchPro before 4.20.8 allows Deserialization of Untrusted Data (in the import database feature of the administration panel), leading to Remote Code execution.