Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/27/2007
09:20 AM
50%
50%

Comodo Touts HackerGuardian

Comodo offers PCI and vulnerability scanning suite that provides both compliancy and security for $99

JERSEY CITY, N.J. -- Research published recently within the security industry confirms that, while PCI is important, it is only one part of a larger vulnerability management framework for protecting consumer data from hackers. According to this study conducted between March and May of 2007 among network compliance management experts, nearly 7 out of 10 IT professionals understand that the PCI compliancy scan may not provide the regular monitoring needed to ensure a website is safe from outside attacks.

PCI compliancy establishes stringent standards on how Emerchants process, store and transmit customer data. One component of these standards includes the requirement that Emerchants scan their websites for possible vulnerabilities at least once per quarter. This scanning requirement provides customer protection, but IT professionals also recognize that, in addition to the PCI-required scan, a daily scanning solution would identify any vulnerability that may otherwise go undetected between the required scans.

Comodo ensures that small and medium-sized businesses (SMBs) are effectively both compliant and secure through a highly cost-effective approach that combines PCI compliancy and security. The HackerGuardian Bundle includes Daily Vulnerability Scanning to detect if a server is vulnerable to hackers and PCI Compliancy Scanning. At $99, Comodo's bundle costs a fraction of the leading competitor's solution, which runs more than $1,000.

"PCI is a great and powerful tool, as well as a requirement," said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. "Therefore, deploying PCI and Daily Vulnerability Scanning allows Emerchants to deliver a trusted and safe online experience for their customers."

Comodo Group

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16772
PUBLISHED: 2019-12-07
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
CVE-2019-9464
PUBLISHED: 2019-12-06
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
CVE-2019-2220
PUBLISHED: 2019-12-06
In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
CVE-2019-2221
PUBLISHED: 2019-12-06
In hasActivityInVisibleTask of WindowProcessController.java there?s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction ...
CVE-2019-2222
PUBLISHED: 2019-12-06
n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...