Raytheon's SureView Insider Threat and Privileged User Abuse Detection Software

Raytheon's SureView Insider Threat and Privileged User Abuse Detection Software

No image available.

DULLES, Va., (April 25, 2014) — Raytheon Company today announced the latest developments found in their new SureView release, which include new policy support features that enhance product capability for continuous monitoring and network auditing against insider threat and privileged user abuse.

With this release, commercial and federal organizations now have access to a Privileged User Monitoring and Auditing (PUMA) Policy Pack specifically designed to enable SureView to detect malicious acts and policy violations by privileged users that often go undetected. Additionally, this latest release includes SureView Spotlight, a software development kit that allows integration with best-of-breed analytic solutions.

“For more than a decade, customers have relied on SureView to detect and stop malicious activity inside their networks. SureView is a proven solution specifically built to address human behavior and provide the insight necessary to recognize both malicious and non-malicious insider threats,” said Ed Hammersla, managing director of Raytheon Cyber Products at Raytheon Intelligence, Information and Services. “The latest enhancements to SureView are the result of customer inputs and lessons learned from long-term deployment. In fact, the PUMA Policy Pack was developed to meet requirements specifically articulated by our customers to mitigate the privileged user threat.”

Additional New features of SureView include:

  • Host-based Network Traffic Monitoring and Collection: Because many network incidents can be attributable to simple negligence, SureView’s new network collector monitors and captures the actual network traffic. If connections or ports are found open, leaving them vulnerable to attack, an alert is sent that includes the user who left the connections open. 
  • Simplified Policy Creation: Now policies can be created with a simple right click and by leveraging Window’s event logs.
  • New Collection Capability: Monitors and collects data published to Windows event log providing easy integration with other technologies such as third party Security Information and Event Management (SIEM) systems.
  • Enterprise Application Suite Enhancements: This release supports large scale deployments with enhanced user, agent and group management. It also provides the ability to generate contextual reports with a simple “right click” and export data to a file that is printer friendly.

Expand for more details on this Product

Emsisoft Emergency Kit 4.0 released

Product From Emsisoft

Salzburg, July 11th, 2013 –As of today, the fourth version of Emsisoft Emergency Kit is available. Popular amongst home users and security professionals alike, the Austrian security specialist‘s powerful software package is freely available to the general public and includes the multi-award winning scanning technology of Emsisoft Anti-Malware. The following features were improved in Emsisoft Emergency Kit 4.0:

Get Info Now

Prolexic releases DDoS protection planning tool

Product From Prolexic


HOLLYWOOD, FL – (June 4, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that it has released a role-based version of PLXplanner, the company’s free, online DDoS protection planning tool. PLXplanner is a strategic risk assessment and planning tool to help IT and security professionals build a better defense against increasingly powerful and sophisticated DDoS attacks. Based on answers entered in a role-based quiz, PLXplanner delivers strategic recommendations for improving business, technology or operational strategies to fight DDoS attacks.

Get Info Now

Precise Sense combination fingerprint/smartcard readers

Product From Precise Biometrics Inc.

Precise Biometrics has launched Precise Sense combination fingerprint/smartcard readers, available in various configurations focusing on different types of requirements. The reader comes in versions including both smartcard and fingerprint reader, or fingerprint only, with either swipe or touch sensors. Because of its modular design, end-users can choose between six different variations. The unit is ideal for organizations looking to use smart cards and biometrics for logical access.

Get Info Now

directQuarantine V1.1

Product From Vircom

directQuarantine is an Outlook add-on module for Vircom's modusGate email security software that provides end-user control of quarantine emails directly from Outlook.

Get Info Now

BioTrust biometric logon software

Product From 3M Cogent

3M Cogent’s BioTrust® biometric logon software is a fast, easy, and secure way to replace your Windows® computer logon. Your face or fingerprint replaces the traditional username and password logon. Just sit down in front of your computer or swipe your finger across the fingerprint sensor and BioTrust will do the rest. Lighting conditions, such as side lighting, backlit areas, low ambient lighting, or lighting from the LCD screen itself are not an issue with 3M Cogent’s advanced facial matching algorithm. All you need is a web camera or a fingerprint sensor.

Get Info Now

SafeErase

Product From Laplink Software

SafeErase is specifically designed to make it quick and easy to delete private data - eliminating any chance of unauthorized access to your personal information. Whether individual files, folders, or an entire hard drive, SafeErase makes certain that confidential data is permanently deleted and unable to be recovered. Laplink SafeErase also comes with pre-defined deletion profiles, as well as the ability to let the user delete browser data and temporary internet files safely, simply, and forever.

Get Info Now

DIGIPASS for Mobile

Product From Vasco

DIGIPASS for Mobile is VASCO's authentication solution that leverages the internet enabled mobile phone for authentication and signature purposes in m-banking, e-banking, e-commerce and enterprise security. The application supports multiple profiles (retail banking, cash management, remote access, application security, gaming). Menus, messages, logos, colors, font can be fully adapted to the service provider's branding, supporting the brand recognition for the end-user. The menus also contribute to the mobile experience offering additional services such as ATM/branch locator, information services, etc.

Get Info Now

Computrace with Geofencing

Product From Absolute Software (computraceplus)

Absolute Software Corp. has added geofencing capabilities to its commercial line of Computrace products. The geofencing feature enables IT asset managers to incorporate the physical location of a device into their IT Asset Management strategy. End-users are alerted after a laptop or mobile device goes beyond a virtual perimeter, which has been defined on a Web-based map. To better protect the device and the data on it, the IT asset manager then can take the appropriate action, such as deleting data from the device and, if necessary, reporting it stolen.

Get Info Now

KMICE0x adaptive module for Edge Security Suite

Product From Milton Security Group Inc.

FULLERTON, Calif., Feb. 6, 2014 /PRNewswire/ -- In the wake of the rampant spread of the Kaptoxa Malware, Milton Security Group is unveiling a breakthrough evolution of its Edge Security suite of products aimed at thwarting the threat known to have affected numerous retail giants such as Target Stores, Neiman Marcus, Michaels and countless other organizations.

Get Info Now

IDS-6300 intelligent security appliance

Product From DB Networks

 

SAN DIEGO – Oct. 23, 2013 -- DB Networks, an innovator of behavioral analysis in database security, today introduced the IDS-6300 intelligent security appliance, the industry’s first next-generation

Get Info Now