News Stay informed about the latest enterprise technology news and product updates.

Quick Takes: Proactive application defense

Quick Takes: Proactive application defense

Okena defends applications from threats

Okena announced this week its new StormSystem products that proactively protect applications from attack. Based on Okena's Incore architecture, StormSystem does not use attack signatures to ward off threats to applications. Incore correlates an application's use-of file, network, registry and COM functions to define and enforce appropriate behavior. StormSystem is made up of several agents, starting with StormWatch intrusion detection agents. StormFront secures applications in tandem with StormWatch, which collects data on application behavior, then creates policies. StormTrack, the third component, is in production. It identifies unprotected components of the IT architecture.

More on StormSystem

Protegrity encryption earns OPSEC certification

Database security software provider Protegrity announced that its encryption-based privacy system for enterprise databases, Secure.Data, achieved Open Platform for Security (OPSEC) certification from Check Point Software Technologies. Secure.Data supports Check Point's VPN-1/Firewall-1 security products via new OPSEC NG interfaces. The certification is specific to Secure.Data for Oracle running on Sun Solaris and its compatibility with Check Point's Secure Virtual Network. This certification follows similar recognition for its Secure.Data for Oracle on Windows NT.

More on Protegrity

Chrysalis-ITS, Swift product deployed by Nordish bank

Chrysalis-ITS' Luna Hardware Security Modules and TrustAct from Swift announced that the combined product is being deployed by Nordish bank, Nordea, the first Nordish financial to implement the Identrus global trust system. TrustAct is a service that provides non-repudiation of message delivery. Lunda modules for PKI ensures security for business-to-business transactions. TrustAct is an Internet-based messaging service for securing B2B e-commerce. The adoption of Chrysalis-ITS FIPS 140-1 validated, Identrus compliant hardware security modules, such as Luna 2, provides an additional layer of hardware based encryption key protection to the secure transaction process.

More on Chrysalis-ITS

BindView certified for HP-UX 11, 11i

Security management product developer, BindView, announced that its vulnerability assessment software, by-Control for Unix, has been certified for HP-UX 11 and 11i. Unix administrators get real-time security assessment with by-Control for Unix, including more than 200 pre-defined reports for assessing a Unix environment's security. Also included are ActiveAdmin, technology that allows IT administrators to "Find and Fix" security holes, enforce standards and implement security policies across and enterprise; Custom Query Builder, a reporting tool that administrators use to develop queries via a point-and-click interface; and Baselining technology that allows administrators to document directory content or server configuration to uncover unauthorized changes.

More on BindView

To have your announcement included in Quick Takes, contact Michael S. Mimoso, News Editor.

Dig Deeper on Web application and API security best practices

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.