Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/19/2006
09:25 AM
50%
50%

IBM Adds Antivirus Features

IBM Internet Security Systems expands desktop protection with additional antivirus and anti-spyware features

ARMONK, N.Y. -- IBM (NYSE: IBM) today announced it has incorporated additional features for antivirus and anti-spyware into its Internet Security Systems™ Proventia® Desktop Endpoint Security product. The combined feature set will provide customers with a comprehensive desktop protection solution. As a result of an alliance with BitDefender, IBM Internet Security Systems will complement its spyware blocking technology and patented, behavioral-based Virus Prevention System (VPS) with BitDefender’s anti-spyware and antivirus solutions.

Internet Security Systems VPS technology is designed to be highly effective at preventing unknown zero-day attacks from entering a corporate network, blocking well over 90 percent of new viruses without a signature update on a typical network. The new layers of protection from BitDefender will provide customers with capabilities for scanning and removing known viruses and spyware from their systems.

“In today’s complicated threat landscape, no single layer of security can adequately protect an organization from attack,” said Greg Adams, vice president of product development for IBM Internet Security Systems. “However, the continual purchase of incompatible security products and endpoint agents can quickly become unbearable for enterprises to manage. As a solution to these opposing issues, we continue to add layers of protection to our existing integrated security platform to provide customers with a robust, centrally managed security solution that can help customers avoid the need to implement additional products to deal with each emerging threat.”

Proventia Desktop currently offers the combined functionality of personal firewall, intrusion prevention, buffer overflow exploit prevention, application and communications protection and virus prevention technologies. Through this alliance with BitDefender for additional antivirus and anti-spyware capabilities, IBM Internet Security Systems answers the market demand for comprehensive desktop protection in a single agent. The various layers of the product are designed to work together seamlessly and automatically combat the myriad of threats encountered on workstations and laptops.

“For each type of security technology (firewalls, antivirus, anti-spyware, etc.), there are attackers who are constantly working on ways to evade it to obtain unauthorized access to a network,” said Eric Eder, founder and CTO of Intelligent Connections, an IBM partner. “Attack vectors designed to exploit each type of technology require a multi-layered security model for protection. Proventia Desktop provides a multi-layered security approach with deployment of a single agent and unified management, which can lower administrative overhead and associated costs. If a threat is designed to bypass one type of security technology, it can be thwarted by a series of other blocking technologies as it attempts to infiltrate the target machine. We are excited to offer our customers such powerful desktop protection in a single agent.”

IBM Internet Security Systems

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
CVE-2019-16761
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0...
CVE-2019-16762
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any...
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.