Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/29/2006
05:15 AM
50%
50%

F-Secure Protects Corporate Data

At the beginning of 2007 the new F-Secure Client Security 7 will take the protection of corporate PCs to a new level

SAN JOSE, Calif. -- At the beginning of 2007 the new F-Secure Client Security 7 will take the protection of corporate PCs to a new level by guarding against such emerging threats as zero-day and rootkit attacks. The latest version of this award-winning software now showcases a number of remarkable new and revised features to ensure world-class data security for corporate customers.

The most significant new feature is the F-Secure DeepGuardT application to provide zero-day protection against previously unknown malware. It uniquely combines several proactive technologies, such as advanced real-time heuristics, sandboxing and behaviour-monitoring with signature based antivirus technology to ensure comprehensive data protection. Instead of just analyzing new programs once when they enter the system, F-Secure DeepGuardT also persistently monitors the behaviour of software in real-time mode, scanning for suspicious program behaviour and stopping activities that might pose a risk.

F-Secure DeepGuardT is designed to require as little user intervention as possible thanks to its artificial intelligence as well as tight integration with antivirus and firewall programs. More detailed information about the technology behind F-Secure DeepGuardT is available at www.f-secure.com/deepguard.

Other innovations in F-Secure Client Security 7 include the ability to find hidden rootkits and lurking spyware through the integrated F-Secure BlackLight? rootkit scanning functionality. The remotely managed rootkit scanning provided by F-Secure BlacklightT holds a unique position in the market allowing administrators to scan the entire company network, for example, during off peak periods, without affecting network usage.

In recognition of the increasing problem of spyware, F-Secure has further improved the spyware protection in F-Secure Client Security 7 bringing detection and removal capabilities to the next level. Improvements also make spyware protection easier and more flexible thanks to several new scanning options. F-Secure Client Security also includes an expanded quarantine feature to list viruses, spyware and riskware.

F-Secure Policy Manager 7, the security management system that comes as part of the F-Secure Client Security 7 package, also brings new functionalities. The latest version includes a unique remote management feature for both F-Secure BlacklightT and F-Secure DeepGuardT. As before, F-Secure Policy Manager enables IT administrators to install, configure, update, upgrade and monitor all the corporate security solutions from a single location.

By combining F-Secure Policy Manager 7 and F-Secure Anti-Virus for Servers 7 with F-Secure Client Security 7, companies can take protection of their computer systems to the next level. New features in F-Secure Anti-Virus for Servers 7 include greater performance, reliability and usability and best-of-breed spyware, rootkit and riskware protection for Windows servers.

Commenting on Client Security 7, Christian Christiansen, IDC VP of Security Products & Services, said, "To deal with the current threat landscape, F-Secure took the next logical step to evolve its data security software. As attacks are increasingly aimed at specific corporate targets, traditional antivirus has difficulty dealing with malware containing cloaking techniques. F-Secure's remotely managed multi-tier Host-based Intrusion Prevention System (HIPS) and rootkit scan offers robust protection needed for the next generation of attacks.

F-Secure Corp.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8216
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8217
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-8218
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8219
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-8220
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions, 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .