Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/26/2007
05:09 AM
50%
50%

Anchiva Delivers Malware Signatures

Anchiva Systems's Rapid RxLabs is now delivering over 700,000 signatures to detect and prevent malware from entering enterprise networks

SANTA CLARA, Calif. -- Anchiva Systems, Inc., a leading provider of Web security appliances for the enterprise, today announced its research lab, Rapid RxLabs, is now delivering over 700,000 signatures to detect and prevent malware from entering enterprise networks. Anchiva has a network of “global honeypots”, which collect viruses and a range of malware that are continuously monitored enabling frequent multiple updates daily to the signature base, providing its customers with the most complete web security threat response on the market today.

Anchiva’s Web Security Appliances have the ability to store more than one million signatures and currently holds over 700,000 malware signatures for long lasting protection against spyware and other malware with long lifecycles. Developed around Anchiva’s RapidRX ASIC high-speed data inspection engine and patent-pending malware identification techniques, Anchiva’s architecture scales to near gigabit rates and ensures secure Internet traffic in and out of corporate networks without impacting performance. Designed for enterprise organizations and service providers, Anchiva’s Web Security Appliances deliver a distinctive solution that scans the volumes of messages passing through network infrastructures while ensuring zero performance issues, or worse, slow down or stoppage of business operations.

The increase in Web 2.0 applications and technologies, and the potential financial gain hackers receive, attacks on Web applications will continue to rise. Enterprises looking to protect their networks at both inbound and outbound entry points need to have in-depth, application-centric, scanning and filtering capabilities to protect vital data. Anti-virus and anti-spyware signatures need to be updated frequently to protect companies against all threats while maintaining the pace of business. Having a security solution that addresses a complete range of security threats as well as performance needs is crucial to mission-critical, optimal business operations. Anchiva not only addresses these issues and threats, but does so at nearly 3 times faster than traditional software solutions.

Anchiva RapidRX Labs is one of the leading malware, anti-virus and vulnerability research organizations in the world, engaging the world's top researchers around the world. Anchiva RapidRX Labs combines world-class malicious code and anti-virus research with intrusion prevention and vulnerability expertise.

“As the number and type of security risks companies are exposed to continues to grow at a rapid rate, the continuous delivery of additional malware signatures is critical to securing Web architectures in the enterprise” said Charles Clark, CEO of Anchiva Systems. “With the current availability of 700,000 malware signatures and the capability to scale to over a million signatures we are confident we are able to offer our customers one of the very best Web security appliances with both the broadest coverage and scalable performance architecture that blocks a complete range of malware.”

Anchiva Systems Inc.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4462
PUBLISHED: 2020-07-16
IBM Sterling External Authentication Server 6.0.1, 6.0.0, 2.4.3.2, and 2.4.2 and IBM Sterling Secure Proxy 6.0.1, 6.0.0, 3.4.3, and 3.4.2 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive i...
CVE-2019-4747
PUBLISHED: 2020-07-16
IBM Team Concert (RTC) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172887.
CVE-2019-4748
PUBLISHED: 2020-07-16
IBM Jazz Team Server based Applications are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 173174.
CVE-2020-14000
PUBLISHED: 2020-07-16
MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code ...
CVE-2020-15027
PUBLISHED: 2020-07-16
ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.