STE WILLIAMS

Gadget world’s metals irreplaceable, say boffins

5 ways to prepare your advertising infrastructure for disaster

Nearly one-fifth of the metal elements present in modern tech products have no replacement candidates if supplies are exhausted, according to a study by Yale University.

In fact, the survey of 62 metals important to modern technology finds that not one of those metals has an “exemplary” alternative to take its place if reserves were to run low.


The study, published in PNAS (abstract here, full version here), is an attempt to assess the “criticality” of various metals used in gadgets – whether as the basis of micro-electronics, batteries, or merely as a circuit trace like copper.

Some of the hardest-to-replace metals include magnesium, manganese, yttrium, rhodium, rhenium, thallium, lead, europium and dysprosium. Without them, we might have trouble producing phosphors for flat panel displays (yttrium and europium), jet engines and electrical contacts (rhenium), optical devices (thallium), permanent magnets (dysprosium) and other high-tech components.

“For some widely used metals — including copper, chromium, manganese, and lead — no good substitutes exist for their major uses,” Yale University says in a statement. Thankfully, at least some of these are highly abundant.

The university says the research “aims to produce a quantitative assessment of how metals are used on a global scale, the extent to which they are recycled, and, ultimately, how future demand will affect material resources.”

Irreplaceable elements - periodic table

Some metals key to technology production have no good substitutes. Source: Yale University

Unsurprisingly, the study’s authors say the tech sector needs to get much, much better at recycling the metals it uses, including designing products to encourage and enable recycling. ®

Disaster recovery protection level self-assessment

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/12/04/gadget_worlds_metals_irreplaceable_say_boffins/

Amazon’s non-existent drone delivery army ALREADY P0WNED

5 ways to prepare your advertising infrastructure for disaster

Weak ownership of the radio control in the world’s most popular quadcopter means it’s trivial to take ownership of any device within range, according to a neat bit of tinkering that points up yet another problem Amazon would have to solve if its “drone delivery” were ever tofly.

And how hard is it? Let’s quote directly from the author, Samy Kamkar: “SkyJack is a perl application which runs off of a Linux machine, runs aircrack-ng in order to get its wifi card into monitor mode, detects all wireless networks and clients around, deactivates any clients connected to Parrot AR.drones, connects to the now free Parrot AR.Drone as its owner, then uses node.js with node-ar-drone to control zombie drones.”


Identifying the target drone is simple, because MAC addresses are registered to the company they’re issued to: Parrot drones are therefore ID’d by their MAC.

The weak ownership of the device over radio is clear from the code. For example:

# now, disconnect the TRUE owner of the drone.

# sucker.

print “Disconnecting the true owner of the drone ;)nn”;

sudo($aireplay, “-0”, “3”, “-a”, $clients{$cli}, “-c”, $cli, $interface);

Oh dear: the drones accept sudo commands from whatever radio it’s accepted as its owner.

The rest of his takeover kit used:

  • A Parrot drone to act as the master;
  • A suitable computer (he uses a Raspberry Pi) as controller;
  • An Alfa AWUS036H wireless transmitter; and
  • Software – aircrack-ng, node-ar-drone, node.js and Kamkar’s SkyJack software.

He notes, however, that your own drone isn’t necessary, since the setup works just fine from the ground.

“The Parrots actually launch their own wireless network which is how the owner of the drone connects. We take over by deauthenticating the owner, then connecting now that the drone is waiting for its owner to connect back in, exploiting the fact that we destroyed their wireless connection temporarily.”

While not immediately a threat to Amazon’s model, since the security of today’s air interface is nowhere near as important as the economic model, GPS accuracy, limited range, regulation, and paranoid Americans with guns, the project is also interesting because Kamkar seems to have been able to knock up the system in fairly short order. ®

Watch Video

Disaster recovery protection level self-assessment

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/12/04/amazons_nonexistent_drone_delivery_army_already_pwned/

D-Link FINALLY slams shut “Joel’s backdoor”

5 ways to prepare your advertising infrastructure for disaster

Better late than never: D-Link has issued the promised patch that closes an administrative backdoor in its SOHO broadband routers.

When the vulnerability was first discovered, the vendor promised to patch it by the end of October.


The patch has now been issued here.

If an attacker set their browser user agent string to read xmlset_roodkcableoj28840ybtide, their D-Link router would obligingly drop them straight into the admin page without a login. Only turning off remote administration would protect the device.

An amusing and really obvious (except that Vulture South didn’t notice it either) aspect of the vulnerability is what happens if the secret string is reversed. As pointed out by Sophos at Paul Ducklin’s Naked Security blog, the string (ignoring the xmlset_ part) reads:

Edit by 04882 Joel Backdoor

In other words, in our opinion, someone dropped the backdoor into the device during development and forgot to remove it later. ®

Disaster recovery protection level self-assessment

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/12/04/dlink_finally_slams_shut_joels_backdoor/

Pen tester scoops source code in bug hunt contest, has to argue for prize

5 ways to prepare your advertising infrastructure for disaster

An Australian penetration tester named Shubham Shah has become the latest to complain about bug bounty programs that offer pathetic – or no – rewards.

The bounty program in question was run by Prezi, a slideware-as-a-service outfit/ The terms of the program state that only certain “ … domains (and every service accessible on them) are in the scope of the bug bounty program.”


Shah went beyond those domains but claims to have come up with the biggest prize imaginable: Prezi’s source code. All of it, using the technique explained here.

He then contacted Prezi to let them know about the problem and received hearty thanks in reply.

The company then refused to reward his efforts because the domain he investigated – http://intra.prezi.com – wasn’t among those listed in the competition.

That decision is rather at odds with the following statement about rewards on offer;

“If you succeed, we will give you cash. That’s right; we’ll pay cold hard currency into your bank account. Think of it as a thank you.”

Shah was eventually offered branded tat, which he rejected as inadequate payment and just not sporting.

After a lengthy correspondence (PDF) Prezi eventually did the right thing, admitting to A Bug in the Bugbounty and promising that “ from now on we will reward bug hunters who find bugs outside of the scope provided that they do not violate our users’ information and that their report triggers us to improve our code base.”

Prezi’s parsimony and eventual reverse is not isolated: Yahoo! recently also made its bug bounty program more rewarding after complains from developers. ®

Disaster recovery protection level self-assessment

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/12/04/prezi_bug_bounty/

Many Commercial Software Projects Contain Older, Vulnerable Open-Source Code

A study of nearly 3,000 commercial software projects found that some 23 percent of them contain open-source components with security flaws.

White Source Software also found that some 98.7 percent of those vulnerable open-source libraries were not the most up-to-date versions. Rami Sass, CEO of White Source, says that’s because there’s typically a disconnect between the open-source community and the developers who adopt their code in their software projects.

“Developers don’t have a good way to keep track and in touch with the work the open-source community members do and the patches and security issues they track,” Sass says. “The chances [are better] that developers hear about [open-source] security vulnerabilities in their projects only if it comes out in the press. Otherwise, they’re not going to go out and look.”

White Source studied open-source library information from various commercial projects as well as an index of known vulnerabilities to gather the data.

Open-source software increasingly is being scrutinized for vulnerabilities, and security experts have been warning enterprises to ensure they are using the most updated versions of open-source libraries. An estimated 80 to 90 percent of custom software uses open-source libraries.

The FS-ISAC (Financial Services Information Sharing and Analysis Center) last month proposed a series of basic security controls for ensuring the security of third-party software used by financial services firms, including policy management for open-source software libraries and components. The goal is to help financial firms ensure their developers are adopting the most current and secure versions of open-source code.

White Source’s Sass says open-source software is typically secure. “Open-source communities are very diligent and go through a lot of trouble fixing and identifying problems. The real issue is the disconnect between that community and its end users,” he says. Many organizations who build their apps with open-source code don’t keep track of updates or patches, for example, he says.

The most common open-source security flaws found in the study were CVE-2011-2730, a configuration flaw in the Spring Framework; CVE-2012-0213, a resource management error in Apache; CVE-2011-2894, a permissions, privileges, and access control flaw in Spring; CVE-2009-2625, a permissions, privileges, and access control flaw in Apache Xerces2; and CVE-2013-0248, a permissions, privileges, and access control flaw in Apache Commons FileUpload.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/vulnerability/many-commercial-software-projects-contai/240164399

Businesses Suffer An Average Of 9 Targeted Attacks Per Year

Advanced persistent threat (APT)-style attacks may be even more pervasive than thought: organizations have suffered on average of nine such targeted attacks in the past 12 months, a new study finds.

Even more chilling: nearly half of those organizations say the attackers successfully stole confidential or sensitive information from their internal networks, according to a new report by the Ponemon Institute called “The State of Advanced Persistent Threats,” which was commissioned by Trusteer. Ponemon surveyed 755 IT and IT security professionals who have had firsthand experience with prevention or detection of targeted attacks on their organizations.

In line with previous reports from other sources, Ponemon found that it took victim organizations painfully long periods of time to even discover they had been hit by these attacks. On average, these attacks went undiscovered for 225 days – a delay respondents attribute to a lack of sufficient endpoint security tools and lean internal resources. According to the Verizon Data Breach Investigations Report (DBIR) released in August, organizations typically don’t discover that they’ve been breached for months and even years after the fact — and nearly 70 percent of them learn from a third party.

But in a dramatic shift from the Verizon report, the new Ponemon study found that most organizations say they are seeing a decline in “opportunistic” or random, non-targeted attacks and an increase in targeted ones. Some 67 percent say opportunistic attacks have not increased in the past 12 months, while 48 percent say targeted attacks have either rapidly increased or increased in same period. The survey defines opportunistic attacks as those where the attackers “have a general
idea of what or whom they want to compromise” and only hack them if they encounter exploitable vulnerabilities. “In contrast, targeted attacks are those in which attackers specifically choose their target and do not give up until this target is compromised,” according to the report.

Verizon’s DBIR, meanwhile, found that 75 percent of all confirmed data breaches last year were the result of financially motivated cyberattacks, while 20 percent were cyberespionage for stealing intellectual property or other information for competitive purposes.

The divergent data here could be a function of organizations becoming more aware of targeted attacks, notes George Tubin, senior security strategist at Trusteer, an IBM company. “As the industry becomes more mature and defining our terms better of what’s opportunistic versus targeted, we’re getting some clarity,” he says.

Cyberespionage actors are getting stealthier, encrypting their malware to evade detection, for example, he says.

Nearly 70 percent of organizations say zero-day malware attacks are the biggest threats to them, and 93 percent say malware was the method of attack employed by the APT actors who targeted them. Half say those attacks originated via phishing.

Anti-malware and intrusion detection systems are mostly no match for exploits and malware, according to the report. Some 76 percent of respondents say exploits and malware got past their AV software, and 72 percent say they got past their IDS.

IDS, IPS, and AV are the top three tools these organizations have in place for detecting targeted attacks. Around 60 percent say opportunistic attacks are easier to prevent than targeted ones, and 46 percent say they are easier to detect.

[The Verizon Data Breach Investigations Report 2013 says financial cybercrime accounting for three-fourths of real-world breaches, followed by cyberespionage in one-fifth of breaches. See No ‘One Size Fits All’ In Data Breaches, New Verizon Report Finds.]

Java and Adobe Reader – two majorly exploited applications – are the biggest thorns in the sides of organizations when it comes to patching. Some 80 percent say Java is the hardest to keep updated with the latest patches; 72 percent, Reader; and 65 percent, Microsoft Windows. “Sixty-four percent say their company continued to operate one or more of these applications in the production environment knowing that vulnerabilities exist and a viable security patch was available but was not implemented,” the report says. And 73 percent say: “If I could, I would discontinue using Java.”

And not surprisingly, the root of much of the APT troubles in these organizations is lack of budget. Nearly 70 percent say their budgets are inadequate for fighting APTs, and 31 percent say they have sufficient in-house resources.

Trusteer’s Tubin says the actual numbers of APT targeted attacks per year, as well as the percentage of successful ones that exfiltrate information, are probably even higher than the Ponemon report shows. “Newer attack techniques that bypass detection technologies are not being picked up,” he says. This stuff is very stealthy … it sits on the network for a very long time, so it’s very likely these companies have additional APTs going on that they just haven’t discovered yet.”

The full Ponemon report is available here.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/attacks-breaches/businesses-suffer-an-average-of-9-target/240164400

Black Friday to Cyber Monday: Keeping Hackers From Having Their Day

Stores across the country were a mad house when Black Friday arrived, with throngs of shoppers showing up to take advantage of seasonal sales. Online, the customer rush is similar, though the security challenge businesses face takes on a different form.

This year, according to analytics firm comScore, online sales on Black Friday totaled an estimated $1.198 billion. But alongside those numbers are numbers like this one from fraud prevention firm Signifyd – an estimated 1.2 percent of ecommerce sales on smartphones were fraudulent. A legitimate transaction on a tablet averaged $132; a fraudulent transaction on a tablet averaged $216.

More numbers – on Dec. 2, investigators from law enforcement agencies around the world seized 690 domain names belonging to sites trafficking in counterfeit goods.

“Black Friday and Cyber Monday just provide an additional avenue that makes the threats seem more legitimate and create spikes in an overwhelming flow of attacks,” explains Colby Clark, director of incident management at FishNet Security. “People are torn on one hand by the desire to be mindful of cyber threats and on the other by trying to take advantage of a deal that seems too good to miss. Unfortunately, the latter usually wins.”

Some managed security providers noted that they did not an abnormal amount of malicious activity affecting their customers on either day. However, according to Clark, much of the malicious activity surrounding Black Friday and Cyber Monday may not have been identified yet. Oftentimes, he says, successful website hacks may not be noticed for weeks or longer due to a lack of monitoring.

For the most part, Black Friday and Cyber Monday hacks focus primarily on social engineering, he says.

“People are expecting solicitations and massive discounts – their guard is down and will likely click on things they otherwise would not,” says Clark, noting there is definitely an uptick on attacks targeting vulnerabilities on mobile devices.

During high volume times for a site, it may be easier for a cyber-attack to be masked by the normal flow of traffic, Jon French, security analyst at AppRiver, tells Dark Reading.

“Similar to how a thief may be able to get away with shoplifting easier when a store is busy,” he says. “It’s always a good idea to keep an eye on any public facing part of the internet but it may be a good idea to play it safe and keep a closer eye during these peak shopping seasons for online retailers. This could involve a variety of actions such as monitoring network patterns or looking for really out of the ordinary orders coming in.”

In preparation for Black Friday and Cyber Monday, security experts at consulting firm Neohapsis recommended businesses use HTTPS to make sure all data between and their site is encrypted and check to make sure systems are patched and updated.

“Businesses should ensure their workstations are in a good security place,” advises Catherine Pearce, security consultant at Neohapsis.

“Unfortunately, this event offers both a good pretense and a good opportunity for security problems if attackers can somehow convince or trick your users into visiting attack sites on their computer,” she adds. “Attackers have been abusing popular trends for years, and some ways they can use Cyber Monday to attack your users include phishing, blackhat SEO [search engine optimization] and watering hole attacks, where attackers have already compromise a legitimate site, but wait for a time of high traffic to launch their attack.”

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/attacks-breaches/black-friday-to-cyber-monday-keeping-hac/240164418

D-Link patches “Joel’s Backdoor” security hole in its SoHo routers

About six weeks ago we wrote about an amusingly alarming security hole in various D-Link routers.

Simply by configuring your browser’s User Agent setting to a not-terribly-secret string of characters, you could skip the router’s login page and thus administer the router without knowing the password.

The alarming part of the hole is that the string is comparatively easy to find in the firmware of all affected routers:

    xmlset_roodkcableoj28840ybtide

The amusing part is what happens if you ignore the xmlset part and reverse the rest:

    Edit by 04882 Joel: Backdoor

We were never quite sure if this was a cheap trick by D-Link so that its own command line utilities could work what you might call “frictionless magic” with your router – look Ma! no password required! – or if it was the accidental aftermath of debugging code that got forgotten.

We never found out who Joel was, either, and we have no idea if 04882 was his D-Link staff number, his nickname, or even some kind of curious date-and-time marker.

The immediate workaround for “Joel’s Backdoor” was to make sure that your router wasn’t accepting admininstrator connections (known as remote management) from the WAN interface, i.e. from traffic coming directly from the internet.

Fortunately, remote management from outside is blocked on D-Link routers by default, thus greatly reducing the risk to most devices.

→ With or without a security hole like this, you almost certainly don’t want remote administration enabled on a SoHo router. Attackers will spot your router at home, and they will regularly and routinely be probing for holes, known and unknown, that could get them into your network. (Check your logs for proof.) Never rely on being “too small and uninteresting” for the crooks.

Nevertheless, it’s still a pretty big risk if anyone on your network can tweak, or be tricked into tweaking, your router settings.

Even if you only let trustworthy friends or family onto your LAN, they might be infected with malware that gives cybercrooks a foothold inside your network and thus direct access to your router.

Or they could be tricked into clicking on a link that was served up from outside, but which points to an internal configuration page on your router.

So the good news is that D-Link has just published firmware upgrades for the routers affected by “Joel’s Backdoor,” namely the following models:

DIR-100  Rev A1     Upgrade 1.13        - 1.14/1.14B01
DIR-120  Rev A1     Upgrade 1.03/1.04RU - 1.05B01
DI-524   Rev E3/E4  Upgrade 5.12        - 5.13B01
DI-524UP Rev A1/A2  Upgrade 1.07        - 1.08B01
DI-604UP Rev A1	    Upgrade 1.03        - 1.04B01
DI-604+  Rev A1     Upgrade 1.10        - 1.11B02 
DI-624S  Rev B1/B2  Upgrade 1.11        - 1.12B01 
TM-G5240 Rev A1     Upgrade 4.00B29     - 4.01B01

You can find out more about the hole that was patched (and hear our advice to programmers on avoiding this sort of vulnerability) in this Sophos podcast:

(Audio player above not working for you? Download to listen offline, or listen on Soundcloud.)

Our discussion of the D-Link hole starts at 2’56”.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/DrjiA9ETPuM/

Stonesoft And Tufin Deliver Integrated Security Management Capabilities Enhancing Situational Awareness And Network Automation

MORRISTOWN, N.J. and HELSINKI, Dec. 3, 2013 /PRNewswire/ — The cyber security expert Stonesoft, a McAfee Group Company, and Tufin Technologies, the market leading provider of Security Policy Orchestration solutions, today announced the completion of the first phase of the integration of their management interfaces. The joint solution combines Stonesoft’s contextual awareness with Tufin’s security policy orchestration to provide joint customers with enhanced network security controls and a more holistic approach to managing increasingly complex, dynamic, multi-vendor networks. Tufin is the first vendor to integrate with Stonesoft’s new Security Management Center API.

Operational leverage

As an enabler of agile and secure operations, the role of network management has become fundamental for organisations. Simultaneously, as networks expand and become more complex, their management becomes increasingly challenging, having to support new technologies and multiple vendor solutions across the organisation. The seamless integration of different management components and tools helps organisations attain a holistic approach to network management that is both secure and efficient.

“Our mutual customers will gain additional value from Tufin and Stonesoft’s established relationship as we move into the second phase of integration and beyond,” said Reuven Harrison, CTO, Tufin. “We look forward to our continued work with Stonesoft to ensure our customers can ensure Security Policy is always in line with business without sacrificing compliance, efficiency or agility.”

Holistic approach to policy management

The Security Management Center (SMC), part of the visionary Stonesoft Next Generation Firewall, provides an Application Programming Interface (API) with the 5.6 release. While the SMC makes management of the Next Generation Firewall smooth and easy, this API simplifies integrations between the SMC and third party management systems. The REST architecture-based SMC API enables network managers to automate tasks such as element and rule addition, editing and removal.

The Tufin Orchestration Suite(TM) is a centralised policy management system spanning over multiple technologies and vendors. Version R13-3 of the Tufin Orchestration Suite adds Stonesoft’s SMC to its wide range of supported network devices.

The initial phase of the integration via the SMC API enables users to manage network topology, view and analyse policies, as well as track policy changes through the Tufin Orchestration Suite. It also provides tools that assist mutual customers in meeting regulatory compliance standards such as PCI-DSS and SOX.

“The integration between Stonesoft and Tufin provides new opportunities for our mutual customers to achieve the best possible situational awareness and network automation in multi-vendor environments,” said Tero Jantunen, SMC Product Architect, Stonesoft, A McAfee Group Company.

Availability

Management integration is available with Stonesoft NGFW release 5.6 and Tufin R13-3. Stonesoft 5.6 and Tufin R13-3 are both immediately available.

Links

— SMC API user’s guide

https://my.stonesoft.com/support/document.do?product=StoneGatedocid=8739

— Tufin Security Policy Orchestration/R13-3 Press Release

http://www.tufin.com/about-us/news-and-media/press-releases/2013/october-22,-2013/

About Stonesoft, a McAfee Group Company

Stonesoft protects valuable information and digital assets through integrated and centrally managed Next Generation Firewall/VPN, intrusion and evasion prevention system technologies. Stonesoft’s product portfolio provides organisations the highest level of cyber security, investment protection, operational resilience, situational awareness, centralised command and control and resource optimisation. Stonesoft’s unified software core enables an adaptive and agile advantage, as well as cost efficiency over hardware- and blade-based competitors. Stonesoft has the highest customer retention rate in the industry due to low TCO, a flexible licensing model and overall customer service excellence. Stonesoft is widely recognised for its research of advanced evasion techniques (AETs) used in targeted cyber attacks. Leading independent test labs and analysts rank its products high in NGFW features, AET protection and manageability. Founded in 1990 and acquired by McAfee in 2013, Stonesoft is part of McAfee’s Security Connected approach creating the world’s most comprehensive security offering.

www.stonesoft.com

ngfw.stonesoft.com

About Tufin Technologies

Tufin is the leader in Security Policy Orchestration, automating and accelerating network infrastructure changes while maintaining security and compliance. By improving network change processes, organisations using the Tufin Orchestration Suite(TM) will have a positive impact on the business by reducing the time and cost spent implementing network changes by up to 80%. Taking a holistic view of IT, the Tufin Orchestration Suite helps organisations automate security and efficiency into day-to-day operations, enabling them to be more agile and leverage technology to gain a competitive advantage. Founded in 2005, Tufin serves more than 1,200 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Tufin partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Stonesoft, Blue Coat, McAfee and BMC Software, and is known for technological innovation and dedicated customer service.

For more information visit www.tufin.com, or follow Tufin on:

— Twitter: http://twitter.com/TufinTech

— Facebook: http://www.facebook.com/Tufintech

— LinkedIn: http://www.linkedin.com/companies/tufin-technologies

— BrightTalk:

https://www.brighttalk.com/community/it-security/channel/9591

— YouTube: http://www.youtube.com/user/Tufintech

— The Tufin Blog: http://www.tufin.com/blog

Article source: http://www.darkreading.com/management/stonesoft-and-tufin-deliver-integrated-s/240164396

Securonix Announces Access Scanner

LOS ANGELES, Dec. 3, 2013 /PRNewswire/ — Securonix, the leader in Security Analytics, announced the new product release of “Access Scanner” which automatically identifies and helps remove high-risk access in critical business applications and systems. Access Scanner uses advanced peer group and outlier analytics to detect high-risk access that can be used in access certification and access request processes. “Our customers are certifying the top 2% – 5% of the riskiest access and seeing up to a 80% access revocation while drastically cutting the compliance burden on the business. The solution can be setup in a matter of days with no business involvement”, says Sachin Nayyar, Founder and CEO of Securonix. The product is available now as a free download from the Securonix website.

Increasingly, access control is the last line of defense against both internal and external attacks. With millions of access privileges to manage across thousands of users and hundreds of applications, organizations continue to struggle with rubberstamping practices in their certification process and very cumbersome access request processes. Securonix provides an innovative, fast and cost effective way to reduce the risk associated with access and meeting compliance requirements.

Access Scanner integrates with every major IAM and identity access governance product while connecting natively to major business applications and systems for delivering a continuous stream of access risk intelligence.

“We had the Access Scanner deployed in our environment and generating results in less than one hour,” says Raz Glazer, Director of Managed Services at Clarizen, a rapidly growing cloud-based enterprise work collaboration software company.

“We immediately were able to expand upon our ability to make sure that only employees in specific roles have access to our sensitive information. With the rapid growth that our company is experiencing, keeping track of access entitlements can be challenging. The Access Scanner eliminates this challenge for us.”

“Managing access in today’s large complex enterprise applications requires a new approach not entirely dependent on the business to manually identify high-risk access. Companies need security intelligence to automatically and continuously identify what is high-risk access so they can focus and streamline their access management processes from requests through certification. At Securonix our whole focus is delivering this security intelligence capability and the release of Access Scanner is our way of demonstrating the ease and power of the technology”

said Tanuj Gulati, Founder and CTO of Securonix.

The “Securonix Access Scanner” is available now for immediate download on the Securonix website (www.securonix.com/access-scanner)

About Securonix

Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management.

For more information visit www.securonix.com

Article source: http://www.darkreading.com/intrusion-prevention/securonix-announces-access-scanner/240164367