Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Third Brigade Expands in US

Third Brigade announced the addition of key systems integrators and resellers in New York, Washington, and Chicago

OTTAWA -- Third Brigade (www.thirbrigade.com), a security software company that specializes in host intrusion prevention systems, today announced the addition of key systems integrators and resellers in New York, Washington, and Chicago to the Third Brigade Partner Force program.

“Enterprises recognize the importance of host intrusion prevention as part of a comprehensive, defense-in-depth strategy, and of the operational merit’s of Third Brigade’s best-in-class product.” said Wael Mohamed, President and CEO of Third Brigade. “The addition of these highly respected, certified partners in three of the largest US markets will help us meet the rapid growth in demand that we’re experiencing.”

Third Brigade certified partners combine market and technology expertise, with consulting, product integration, support and training services, to provide customers with a complete host intrusion prevention system that supports their unique business and security needs.

Secure Technology Integration Group, Ltd. (STIGroup) provides a full range of information security consulting, implementation and managed services for clients in the New York City Tri-State Area. “With over 300 customers including many Fortune 500 corporations, we understand the security needs of today’s dynamic enterprise, said Aric Perminter, Partner of STIGroup. “We've worked extensively with various host-based intrusion prevention solutions from a multitude of vendors over the past several years, and we're extremely impressed with the Third Brigade product's ease of implementation, strong protection, and superior visibility into host security posture for audit and management purposes.”

AFG Solutions is a security reseller serving the US mid-west. “We’re seeing a strong recognition by organizations – particularly in financial services and healthcare – of the importance of adding compensating security controls at the host itself, to protect mission critical servers, applications and sensitive data,” said Marc Peterson, President of AFG Solutions. “Third Brigade’s approach – of bringing proven, network security approaches, including firewall and intrusion detection and prevention, down to individual computers and devices – is very appealing to our customers.”

TCAssociates is an 8(a) certified, Service Disabled Veteran (SDV) owned small business headquartered in the Washington DC Metro. It provides consulting, implementation, and technical support for proven security products. “As trusted security advisors to our clients, we are responsible for helping them protect their IT assets, including mission critical servers,” said Roger Stull, COO of TCAssociates. “Third Brigade combines a best-of-breed product that has been architected to support the demanding needs of government, healthcare and other enterprises, with the responsiveness needed to stay ahead of the latest threats.”

Third Brigade Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.