Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Vulnerability Management

7/14/2014
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

General Dynamics Fidelis Cybersecurity Solutions Joins Forces with Microsoft to Further Protect Customers

As a member of the Microsoft Active Protections Program, General Dynamics Fidelis will enhance threat protection for Fidelis XPS customers by receiving vulnerability information faster.

WALTHAM, Mass., July 14, 2014 /PRNewswire/ -- General Dynamics Fidelis Cybersecurity Solutions announced that it has joined the Microsoft Active Protections Program (MAPP). Under this industry partnership program, General Dynamics Fidelis will receive advanced information from Microsoft about their monthly security bulletins, allowing the team to anticipate emerging threats and provide faster and more comprehensive protection for Fidelis XPS customers.

"In today's fight against advanced cyber adversaries, it's important that we arm our customers with the best defense possible, and collaboration across the entire cybersecurity community is a critical part of that defense," said Peter George, president, General Dynamics Fidelis Cybersecurity Solutions. "Together with Microsoft we will provide our customers with the technologies and intelligence to protect their enterprise and fight the bad actors."

By having access to detailed vulnerability information before Microsoft publicly releases its security bulletins, General Dynamics Fidelis can more efficiently and effectively protect Fidelis XPS customers. With the information shared in a secure and confidential manner to prevent it from being used maliciously, it provides protections for mutual customers during the window between the release of security updates and customers applying them to their system. This advanced protection also enables General Dynamics Fidelis to quickly address and mitigate vulnerabilities, further preventing, detecting and ultimately stopping cyber-attacks across the entire threat lifecycle.

"Members of the MAPP share our passion for industry collaboration to protect a world full of Internet users," said Jerry Bryant, senior security lead for the Microsoft Active Protections Program, Microsoft Corp. "No one company can accomplish this by itself. That is why we are working with General Dynamics Fidelis Cybersecurity Solutions to advance and improve security."

Built on General Dynamics Fidelis Cybersecurity Solutions' patented Deep Session Inspection® platform, Fidelis XPS is an industry leading network security appliance that delivers network visibility, analysis and control over all ports and all channels in real-time, to defend against advanced threats and prevent the possibility of a data breach on multi-gigabit-speed networks. Deployed as a context-aware network appliance, Fidelis XPS gives global enterprises and government agencies the ability to see, study and stop advanced threats during all phases of the threat lifecycle.

General Dynamics Fidelis Cybersecurity Solutions offers a comprehensive portfolio of products, services and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our commercial enterprise and government customers around the globe can face advanced threats with confidence through use of our Network Defense and Forensics Services, delivered by a team of security professionals with decades of hands-on experience, and our award-winning Fidelis XPS Advanced Threat Defense products, which provide visibility and control over the entire threat life cycle. To learn more about General Dynamics Fidelis Cybersecurity Solutions, please visit www.fidelissecurity.com.

For more information on Microsoft Active Protections Program, please visit http://technet.microsoft.com/en-us/security/dn467924.aspx.

 

General Dynamics Fidelis Cybersecurity Solutions is a part of General Dynamics Advanced Information Systems, a business unit of General Dynamics (NYSE: GD

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16863
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
CVE-2019-18949
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
CVE-2011-1930
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
CVE-2011-1145
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
CVE-2011-1488
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...