Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

01:20 AM

Sensory, Vendors Partner

Sensory unveiled the industry's largest ecosystem of applications designed to run on Sensory's NodalCore acceleration platform

PALO ALTO, Calif. -- Sensory Networks, a leader in content security acceleration technology, today unveiled the network security industry’s largest ecosystem of applications designed to run on Sensory’s NodalCore® acceleration platform. Applications such as Antivirus, Antispam, Antispyware and IPS/IDS from leading commercial vendors, as well as popular open source projects, have leveraged Sensory’s NodalCore acceleration technology to offer multi-gigabit throughput performance while simultaneously scanning network traffic for millions of security threats.

The first commercial vendors offering accelerated applications in Sensory Networks’ Application Ecosystem include: AhnLab, Endeavor Security, Eneo Tecnologia, Exinda Networks, Kaspersky Lab, Intoto, Mail-Filters, Mailshell, McAfee, Message Labs, PC Tools, Sunbelt Software and ThreatMETRIX. Additionally, open source applications available include: Snort®, Clam AV™, DSPAM and Apache Spam Assassin™. These application partners join Sensory Networks’ core Technology and Appliance partners including Xilinx, Intel, NEXCOM International, Lanner Electronics, and Advantech.

In the new generation security appliance market, it no longer makes sense for appliance designers to develop and integrate all these applications in-house - general purpose architectures simply cannot provide the necessary processing power and meet the price vs. performance benchmarks sought by the market. By providing the performance engine for deep-content scanning of network traffic, Sensory’s NodalCore acceleration technology off-loads application vendors from speed constraints and allows them to focus on their core competencies and features.

“At Sensory we quickly recognized the critical importance of high-performance security applications for the emerging security threat management market,” said Matt Barrie, CEO for Sensory Networks. “As a result, our Application Ecosystem initiative provides appliance manufacturers with an extensive library of pre-accelerated applications built by tier-1 vendors, from which they can choose, integrate and quickly roll out.”

Sensory Networks Inc.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...