Okena defends applications from threats
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Okena announced this week its new StormSystem products that proactively protect applications from attack. Based on Okena's Incore architecture, StormSystem does not use attack signatures to ward off threats to applications. Incore correlates an application's use-of file, network, registry and COM functions to define and enforce appropriate behavior. StormSystem is made up of several agents, starting with StormWatch intrusion detection agents. StormFront secures applications in tandem with StormWatch, which collects data on application behavior, then creates policies. StormTrack, the third component, is in production. It identifies unprotected components of the IT architecture.
Protegrity encryption earns OPSEC certification
Database security software provider Protegrity announced that its encryption-based privacy system for enterprise databases, Secure.Data, achieved Open Platform for Security (OPSEC) certification from Check Point Software Technologies. Secure.Data supports Check Point's VPN-1/Firewall-1 security products via new OPSEC NG interfaces. The certification is specific to Secure.Data for Oracle running on Sun Solaris and its compatibility with Check Point's Secure Virtual Network. This certification follows similar recognition for its Secure.Data for Oracle on Windows NT.
Chrysalis-ITS, Swift product deployed by Nordish bank
Chrysalis-ITS' Luna Hardware Security Modules and TrustAct from Swift announced that the combined product is being deployed by Nordish bank, Nordea, the first Nordish financial to implement the Identrus global trust system. TrustAct is a service that provides non-repudiation of message delivery. Lunda modules for PKI ensures security for business-to-business transactions. TrustAct is an Internet-based messaging service for securing B2B e-commerce. The adoption of Chrysalis-ITS FIPS 140-1 validated, Identrus compliant hardware security modules, such as Luna 2, provides an additional layer of hardware based encryption key protection to the secure transaction process.
BindView certified for HP-UX 11, 11i
Security management product developer, BindView, announced that its vulnerability assessment software, by-Control for Unix, has been certified for HP-UX 11 and 11i. Unix administrators get real-time security assessment with by-Control for Unix, including more than 200 pre-defined reports for assessing a Unix environment's security. Also included are ActiveAdmin, technology that allows IT administrators to "Find and Fix" security holes, enforce standards and implement security policies across and enterprise; Custom Query Builder, a reporting tool that administrators use to develop queries via a point-and-click interface; and Baselining technology that allows administrators to document directory content or server configuration to uncover unauthorized changes.
To have your announcement included in Quick Takes, contact Michael S. Mimoso, News Editor.
Dig Deeper on Web Application Security