Cambia, NCircle PartnerCambia, NCircle Partner
Cambia announced that nCircle has joined its technology partner program
August 15, 2006
ALPHARETTA, Ga. -- Cambia Security Inc., a leading provider of security policy enforcement software, today announced that nCircle, a provider of enterprise-class vulnerability and risk management solutions, has joined its technology partner program. The partnership combines Cambia CM(TM) and nCircle IP360(TM) to create an integrated solution for managing asset configuration compliance deviations and intelligently assessing security risks introduced due to these deviations on network and host devices.
Cambia's continuous monitoring and assessment of network inventory, asset configurations and the changes they undergo complements nCircle's continuous, comprehensive security risk management capabilities. Customers will be provided with a single integrated solution, delivering continuous visibility and immediate risk analysis of the network's security posture.
When Cambia CM identifies a network change that warrants further investigation, it can invoke nCircle IP360 for in-depth vulnerability and security risk analysis. This reduces the time and cost associated with network protection and compliance analysis. Given the ever-increasing challenges of establishing and maintaining a high security posture, Cambia and nCircle offer organizations a solution that allows them to stay one-step ahead.
"Working with Cambia on this integration was a natural fit for us," said Stefan Petry, vice president of product management for nCircle. "IP360 and Cambia CM provide complementary capabilities which are delivered using easy-to-maintain agentless architectures. We're pleased to offer customers this joint solution to defend enterprise networks against serious risks."
"Partnering with nCircle enables our customers to better prepare their networks for security risks," said Joan Herbig, CEO for Cambia Security. "Other products offer a snapshot view of assets, but with the integration of Cambia CM and nCircle IP360, IT managers are able to view their networks in real-time and react before the risk becomes a bigger issue."
Read more about:2006
About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023