Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/7/2010
12:44 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

RSA And Check Point Team Up To Offer Consumers Enhanced Protection Against Online Attacks

RSA FraudAction solution is a 24x7 service designed to detect, track, block, and shut down phishing, pharming and Trojan attacks

BEDFORD, Mass., June 7 /PRNewswire/ -- RSA, The Security Division of EMC (NYSE: EMC) announced a technology agreement with Check Point Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, to provide consumers around the globe with enhanced, real-time protection against Trojan, phishing and other online attacks.

RSA is supplying real-time online threat intelligence feeds from its RSA FraudAction(TM) Anti-Trojan and Anti-Phishing services to Check Point's solutions. This new capacity is integrated into the existing anti-phishing functionality available in all ZoneAlarm premium consumer products including ZoneAlarm Internet Security Suite and ZoneAlarm Extreme Security to provide consumers world-wide with enhanced and proactive protection against online attacks.

"Leveraging external threat information from RSA enables Check Point to strengthen its detection and analysis capabilities and offer superior protection to our customers," said Bari Abdul, vice president of consumer sales, Check Point Software Technologies Ltd. "The implementation of anti-Trojan filtering and identity theft protection helps address some of the key customer needs and pain points. We are pleased to add RSA to our list of technology partners as we work together to provide customers with strong levels of protection."

RSA FraudAction solution is a 24x7 service designed to detect, track, block, and shut down phishing, pharming and Trojan attacks perpetrated by online fraudsters. It has shut down more than 300,000 illicit web sites across 140 countries to date. RSA's online fraud analysts operate from the RSA Anti-Fraud Command Center to shut down hosted online attacks, deploy countermeasures, and conduct extensive forensic work to reduce the average lifetime of an online attack. RSA FraudAction service is a component of the RSA Identity Protection and Verification Suite, one of the most complete and innovative Software-as-a-Service portfolios of strong authentication and anti-fraud technologies.

"Our relationship with Check Point is another example that inventive collaboration between industry leaders can expand our collective abilities to protect consumers against ever-evolving online threats. This brings more value to our users by integrating real-time detection and blocking capabilities on a wider scale," said Christopher Young, Senior Vice President, Technology, Products and Markets at RSA. "Together, we can grow an even stronger security ecosystem in order to become a more effective and organized entity against the vast underground network of fraudsters."

About RSA

RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. RSA's information-centric approach to security guards the integrity and confidentiality of information throughout its lifecycle - no matter where it moves, who accesses it or how it is used.

RSA offers industry-leading solutions in identity assurance & access control, data loss prevention, encryption & key management, compliance & security information management and fraud protection. These solutions bring trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4682
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
CVE-2020-4888
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
CVE-2020-13569
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.