Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/29/2006
05:15 AM
50%
50%

F-Secure Protects Corporate Data

At the beginning of 2007 the new F-Secure Client Security 7 will take the protection of corporate PCs to a new level

SAN JOSE, Calif. -- At the beginning of 2007 the new F-Secure Client Security 7 will take the protection of corporate PCs to a new level by guarding against such emerging threats as zero-day and rootkit attacks. The latest version of this award-winning software now showcases a number of remarkable new and revised features to ensure world-class data security for corporate customers.

The most significant new feature is the F-Secure DeepGuardT application to provide zero-day protection against previously unknown malware. It uniquely combines several proactive technologies, such as advanced real-time heuristics, sandboxing and behaviour-monitoring with signature based antivirus technology to ensure comprehensive data protection. Instead of just analyzing new programs once when they enter the system, F-Secure DeepGuardT also persistently monitors the behaviour of software in real-time mode, scanning for suspicious program behaviour and stopping activities that might pose a risk.

F-Secure DeepGuardT is designed to require as little user intervention as possible thanks to its artificial intelligence as well as tight integration with antivirus and firewall programs. More detailed information about the technology behind F-Secure DeepGuardT is available at www.f-secure.com/deepguard.

Other innovations in F-Secure Client Security 7 include the ability to find hidden rootkits and lurking spyware through the integrated F-Secure BlackLight? rootkit scanning functionality. The remotely managed rootkit scanning provided by F-Secure BlacklightT holds a unique position in the market allowing administrators to scan the entire company network, for example, during off peak periods, without affecting network usage.

In recognition of the increasing problem of spyware, F-Secure has further improved the spyware protection in F-Secure Client Security 7 bringing detection and removal capabilities to the next level. Improvements also make spyware protection easier and more flexible thanks to several new scanning options. F-Secure Client Security also includes an expanded quarantine feature to list viruses, spyware and riskware.

F-Secure Policy Manager 7, the security management system that comes as part of the F-Secure Client Security 7 package, also brings new functionalities. The latest version includes a unique remote management feature for both F-Secure BlacklightT and F-Secure DeepGuardT. As before, F-Secure Policy Manager enables IT administrators to install, configure, update, upgrade and monitor all the corporate security solutions from a single location.

By combining F-Secure Policy Manager 7 and F-Secure Anti-Virus for Servers 7 with F-Secure Client Security 7, companies can take protection of their computer systems to the next level. New features in F-Secure Anti-Virus for Servers 7 include greater performance, reliability and usability and best-of-breed spyware, rootkit and riskware protection for Windows servers.

Commenting on Client Security 7, Christian Christiansen, IDC VP of Security Products & Services, said, "To deal with the current threat landscape, F-Secure took the next logical step to evolve its data security software. As attacks are increasingly aimed at specific corporate targets, traditional antivirus has difficulty dealing with malware containing cloaking techniques. F-Secure's remotely managed multi-tier Host-based Intrusion Prevention System (HIPS) and rootkit scan offers robust protection needed for the next generation of attacks.

F-Secure Corp.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13842
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). A dangerous AT command was made available even though it is unused. The LG ID is LVE-SMP-200010 (June 2020).
CVE-2020-13843
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS software before 2020-06-01. Local users can cause a denial of service because checking of the userdata partition is mishandled. The LG ID is LVE-SMP-200014 (June 2020).
CVE-2020-13839
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via a custom AT command handler buffer overflow. The LG ID is LVE-SMP-200007 (June 2020).
CVE-2020-13840
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via an MTK AT command handler buffer overflow. The LG ID is LVE-SMP-200008 (June 2020).
CVE-2020-13841
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 9 and 10 (MTK chipsets). An AT command handler allows attackers to bypass intended access restrictions. The LG ID is LVE-SMP-200009 (June 2020).