Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/26/2007
05:09 AM
50%
50%

Anchiva Delivers Malware Signatures

Anchiva Systems's Rapid RxLabs is now delivering over 700,000 signatures to detect and prevent malware from entering enterprise networks

SANTA CLARA, Calif. -- Anchiva Systems, Inc., a leading provider of Web security appliances for the enterprise, today announced its research lab, Rapid RxLabs, is now delivering over 700,000 signatures to detect and prevent malware from entering enterprise networks. Anchiva has a network of “global honeypots”, which collect viruses and a range of malware that are continuously monitored enabling frequent multiple updates daily to the signature base, providing its customers with the most complete web security threat response on the market today.

Anchiva’s Web Security Appliances have the ability to store more than one million signatures and currently holds over 700,000 malware signatures for long lasting protection against spyware and other malware with long lifecycles. Developed around Anchiva’s RapidRX ASIC high-speed data inspection engine and patent-pending malware identification techniques, Anchiva’s architecture scales to near gigabit rates and ensures secure Internet traffic in and out of corporate networks without impacting performance. Designed for enterprise organizations and service providers, Anchiva’s Web Security Appliances deliver a distinctive solution that scans the volumes of messages passing through network infrastructures while ensuring zero performance issues, or worse, slow down or stoppage of business operations.

The increase in Web 2.0 applications and technologies, and the potential financial gain hackers receive, attacks on Web applications will continue to rise. Enterprises looking to protect their networks at both inbound and outbound entry points need to have in-depth, application-centric, scanning and filtering capabilities to protect vital data. Anti-virus and anti-spyware signatures need to be updated frequently to protect companies against all threats while maintaining the pace of business. Having a security solution that addresses a complete range of security threats as well as performance needs is crucial to mission-critical, optimal business operations. Anchiva not only addresses these issues and threats, but does so at nearly 3 times faster than traditional software solutions.

Anchiva RapidRX Labs is one of the leading malware, anti-virus and vulnerability research organizations in the world, engaging the world's top researchers around the world. Anchiva RapidRX Labs combines world-class malicious code and anti-virus research with intrusion prevention and vulnerability expertise.

“As the number and type of security risks companies are exposed to continues to grow at a rapid rate, the continuous delivery of additional malware signatures is critical to securing Web architectures in the enterprise” said Charles Clark, CEO of Anchiva Systems. “With the current availability of 700,000 malware signatures and the capability to scale to over a million signatures we are confident we are able to offer our customers one of the very best Web security appliances with both the broadest coverage and scalable performance architecture that blocks a complete range of malware.”

Anchiva Systems Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10694
PUBLISHED: 2019-12-12
The express install, which is the suggested way to install Puppet Enterprise, gives the user a URL at the end of the install to set the admin password. If they do not use that URL, there is an overlooked default password for the admin user. This was resolved in Puppet Enterprise 2019.0.3 and 2018.1....
CVE-2019-10695
PUBLISHED: 2019-12-12
When using the cd4pe::root_configuration task to configure a Continuous Delivery for PE installation, the root user�s username and password were exposed in the job�s Job Details pane in the PE console. These issues have been resolved in version 1.2.1 of the ...
CVE-2019-5085
PUBLISHED: 2019-12-12
An exploitable code execution vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an integer overflow, resulting in heap corruption. An attacker can send a packet to trigger this vulnerability.
CVE-2019-5090
PUBLISHED: 2019-12-12
An exploitable information disclosure vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an out-of-bounds read, resulting in information disclosure. An attacker can send a packet to trigger this vulner...
CVE-2019-5091
PUBLISHED: 2019-12-12
An exploitable denial-of-service vulnerability exists in the Dicom-packet parsing functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an infinite loop, resulting in a denial of service. An attacker can send a packet to trigger this vulnerability.