Welcome!

Industrial IoT Authors: Pat Romanski, Liz McMillan, Elizabeth White, Jeev Trika, Scott Allen

News Feed Item

Secunia launches Secunia Vulnerability Intelligence Manager 4.0

78% of vulnerabilities are found in third-party programs. Security teams cannot monitor all of them manually or determine which ones are critical to their organization.

COPENHAGEN, Denmark, Oct. 30, 2012 /PRNewswire/ -- Secunia, the leading provider of IT security solutions that enablese businesses and private individuals to manage and control vulnerability threats, today announced the general availability of the new version of Secunia's Vulnerability Intelligence Manager, the VIM 4.0.

(Photo:  http://photos.prnewswire.com/prnh/20121030/PH02493 )

(Logo:  http://photos.prnewswire.com/prnh/20121025/MM00581LOGO )

The Secunia VIM 4.0 is the latest evolutionary step in the technology Secunia has developed to help organizations handle vulnerabilities and protect business critical information and assets against potential attacks. Because it covers more than 40,000 software systems and applications, the VIM 4.0 solution provides the most comprehensive intelligence about software vulnerabilities available to organizations, ensuring that all security threats can be dealt with before the IT infrastructure is compromised by cybercriminals.

"We're very happy with this new version of the VIM. The acclaimed quality of the intelligence delivered by Secunia's Research Team is the backbone of the solution, and that intelligence becomes pure power in the hands of the security teams in the organizations; it provides them with the relevant intelligence so they can target their efforts and deal with the vulnerabilities that are critical to their business, instead of the teams spending their time frantically trying to figure out which issues to address in what order. That's the assurance and focus the VIM provides: because of the accuracy of the intelligence, the real-time delivery and the reports, filters and settings, security departments are able to distribute the intelligence to the appropriate stakeholders within the organisation and to set up effective security processes," said Morten R. Stengaard, Director of Product Management and Quality Assurance at Secunia.

Meeting compliancy requirements
Since Secunia started 10 years ago, the in-house Research Team has delivered real-time intelligence customized to the needs of the individual company. The solution enables organizations to provide external auditors with exhaustive information on how compliance policies are met.

"This is particularly important to corporations and organizations in the US, who have to meet exacting standards to keep their IT infrastructure secure, and who risk heavy fines if they do not meet the compliancy requirements that apply to their particular industry," explained Morten R. Stengaard.

One example of an industry standard that requires intelligence about software vulnerabilities is the PCI DSS (The Payment Card Industry Data Security Standard) Guidelines.

"The Secunia VIM delivers a comprehensive solution to automate the process of compliance with guidelines such as these: With the vulnerability intelligence manager, organisations can easily formalize and automate the tasks that are typically weak links in compliance: assessment, remediation, approval workflow, exception management, and consolidated reporting. The Secunia VIM helps organisations tackle those difficult problems, while also easing the task of defining and managing policies, mapping policies to controls, and collecting/archiving evidence of compliance," said Morten R. Stengaard.

Flaws give access
As cybercrime against corporations, organizations and government institutions is slowly becoming a recognized security threat, the importance of managing software vulnerabilities is an aspect of security that is gradually receiving attention in organizations around the world.

If there are flaws in the software, cybercriminals have access to the entire infrastructure of any organization. And modern organizations use a lot of different software programs: it is a common misconception to think that only the organization-wide systems purchased, implemented and maintained by company IT departments pose a risk.  Literally any software flaw in any program or app used in any endpoint related to the organization represents a security risk – including company laptops used both professionally and privately by employees.

Effectively, any program downloaded to an employee laptop is a threat to the organization's security. Consequently, it is not enough to manage the software systems that make up the organisation's official software infrastructure.

"And it is not enough to wait for official software patches from Microsoft," warns Morten R. Stengaard: "As only 22% of vulnerabilities affect Microsoft programs and operating systems, it is critical to have the correct vulnerability intelligence to spot the vulnerabilities in the remaining 78% - the third-party programs. And the threat to third-party programs is on the increase:  the share of vulnerabilities in these has risen from 45% to 78% from 2006 to 2011."

Recent research from information technology research company Gartner, emphasizes the risk software vulnerabilities pose:

"Through 2015, 80% of successful attacks will exploit well-known vulnerabilities and be detectable via security monitoring. […] Applications are the gateways to the data that is the focus of a targeted attack. Dynamic application security testing (DAST) tools can be used to scan productions applications to find vulnerabilities. When a vulnerability is present on a running application, production data is at risk, and remediation cycle times are long – typically taking multiple months.

Gartner: "Adapting Vulnerability Management to Advanced Threats", August 2012.

Key benefits of the Secunia VIM include:

  • Reliable and accurate Vulnerability Intelligence at your fingertips
  • Personalised alerts via email and SMS
  • Comprehensive XML feeds
  • Comprehensive Vulnerability Management tool
  • Threat intelligence covering more than 40,000 systems and applications

What's new in VIM 4.0:

  • New and improved user interface
  • Integration with the Secunia CSI
  • Improved assets matching
  • Improved data export
  • Activity log

To request a free trial, click here.

About Secunia
Founded in 2002, Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats, risks across their networks, and end-points. This is enabled by Secunia's award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal and cost-effective protection of critical information assets.

Secunia plays an important role in the IT security ecosystem, and is the preferred supplier for enterprises and government agencies worldwide, counting Fortune 500 and Global 2000 businesses among its customer base. Secunia is headquartered in Copenhagen, Denmark.

For more information, please visit secunia.com

Follow Secunia

 

SOURCE Secunia

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...