Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/26/2007
05:09 AM
50%
50%

Anchiva Delivers Malware Signatures

Anchiva Systems's Rapid RxLabs is now delivering over 700,000 signatures to detect and prevent malware from entering enterprise networks

SANTA CLARA, Calif. -- Anchiva Systems, Inc., a leading provider of Web security appliances for the enterprise, today announced its research lab, Rapid RxLabs, is now delivering over 700,000 signatures to detect and prevent malware from entering enterprise networks. Anchiva has a network of “global honeypots”, which collect viruses and a range of malware that are continuously monitored enabling frequent multiple updates daily to the signature base, providing its customers with the most complete web security threat response on the market today.

Anchiva’s Web Security Appliances have the ability to store more than one million signatures and currently holds over 700,000 malware signatures for long lasting protection against spyware and other malware with long lifecycles. Developed around Anchiva’s RapidRX ASIC high-speed data inspection engine and patent-pending malware identification techniques, Anchiva’s architecture scales to near gigabit rates and ensures secure Internet traffic in and out of corporate networks without impacting performance. Designed for enterprise organizations and service providers, Anchiva’s Web Security Appliances deliver a distinctive solution that scans the volumes of messages passing through network infrastructures while ensuring zero performance issues, or worse, slow down or stoppage of business operations.

The increase in Web 2.0 applications and technologies, and the potential financial gain hackers receive, attacks on Web applications will continue to rise. Enterprises looking to protect their networks at both inbound and outbound entry points need to have in-depth, application-centric, scanning and filtering capabilities to protect vital data. Anti-virus and anti-spyware signatures need to be updated frequently to protect companies against all threats while maintaining the pace of business. Having a security solution that addresses a complete range of security threats as well as performance needs is crucial to mission-critical, optimal business operations. Anchiva not only addresses these issues and threats, but does so at nearly 3 times faster than traditional software solutions.

Anchiva RapidRX Labs is one of the leading malware, anti-virus and vulnerability research organizations in the world, engaging the world's top researchers around the world. Anchiva RapidRX Labs combines world-class malicious code and anti-virus research with intrusion prevention and vulnerability expertise.

“As the number and type of security risks companies are exposed to continues to grow at a rapid rate, the continuous delivery of additional malware signatures is critical to securing Web architectures in the enterprise” said Charles Clark, CEO of Anchiva Systems. “With the current availability of 700,000 malware signatures and the capability to scale to over a million signatures we are confident we are able to offer our customers one of the very best Web security appliances with both the broadest coverage and scalable performance architecture that blocks a complete range of malware.”

Anchiva Systems Inc.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16168
PUBLISHED: 2020-08-07
Temi firmware 20190419.165201 does not properly verify that the source of data or communication is valid, aka an Origin Validation Error.
CVE-2020-8025
PUBLISHED: 2020-08-07
A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the p...
CVE-2020-8026
PUBLISHED: 2020-08-07
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior...
CVE-2020-16219
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16221
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.