Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Archives for May 2013

Back To Basics

2013/05/21 by admin

It is time to get back to basics, and to really detail out your plan of attack. We invite you to read our ‘Back to Basics – How to Protect your Organizational Assets and Confidential Information. It is provided as a guideline only, however if you do have any questions, or would like some additional information please feel free to contact me directly. Getting_Back_to_Basics

Filed Under: antivirus, byod, Cloud, compliance, endpoint, industry, Log Management, NetClarity, PCI, Products, profile, Security News, Snare, Snare Agents, Unified Threat Management

Sophos Rolls Out New Unified Threat Management Connected

2013/05/15 by admin

Solution offers combined gateway, endpoint, and cloud Web protection

May 13, 2013

BOSTON, MA – May 13, 2013 – Sophos today announced the availability of Sophos UTM Connected, the latest version of its award-winning UTM (unified threat management solution). This release introduces expanded UTM managed endpoint protection with unique Web in Endpoint functionality, broader wireless coverage for large scale wireless deployments and higher performance networking.

As the complexities of securing all networks have grown, so have the struggles for businesses to fully optimize the many point security solutions they have purchased. A UTM is the proven solution to address this problem, however most simply put layers of protection on a single appliance. The introduction of Web in Endpoint functionality lets Sophos UTM go a stage further and make security layers communicate and combine to deliver more effective protection. This approach simplifies user experience and delivers a higher level of overall protection on which customers can rely.

[Read More]

Filed Under: antivirus, byod, Cloud, compliance, endpoint, industry, PCI, Products, profile, Security News, Unified Threat Management

Five Habits Of Highly Successful Malware

2013/05/06 by admin

Robert Lemos, DarkReading

The Internet frequently represents evolution on steroids, and the malware ecosystem is no different.

Malware has quickly evolved to take advantage of weaknesses in digital defenses. In 2012, more than 40 million Windows systems were infected with malware, according to data collected by Microsoft in its annual Security Intelligence Report. And Google researchers found that, of four common antivirus scanners, the best only detected 25 percent of real-world malware, and combined, the scanners only caught 40 percent of malicious downloads.

Malware writers have honed their technique to do well against current defenses, says Srinavas Kumar, chief technology officer of TaaSERA, a security-service provider.

“The malware writers know how to get around antivirus software,” he says. “They can detect that antivirus is running or that IPS/IDS is watching and make it very difficult to blacklist them.”

To defend against the latest attacks, enterprise security professionals need to know why today’s malware is so successful. Culling data from a number of recent studies and discussions with security experts identifies five strategies for success.

[Read More]

Filed Under: antivirus, byod, endpoint, industry, Security News

Website vulnerabilities down, but progress still needed, survey finds

2013/05/03 by admin

SearchSecurity – George Leopold, Contributor Published: 02 May 2013

Fully one-third of all websites surveyed last year were found to be vulnerable on a daily basis to a “serious” flaw like cross-site scripting, information leakage or content spoofing, according to a report on site vulnerabilities released today by WhiteHat Security.

While industries like entertainment and media were relatively quick to fix website vulnerabilities (an average of 33 days), WhiteHat’s survey found that industry-wide the average was 193 days from first notification.

Retail, health care and insurance websites were among the laggards, each taking well over 200 days to fix their sites after notification. Frequently updated retail sites, for instance, generally pose greater security challenges for Web developers, experts said, because each code deployment introduces new vulnerabilities.

“It’s an unforgiving environment,” stressed Jeremiah Grossman, WhiteHat Security’s founder and chief technical officer. The proliferation of “broken code” results in a “race to see who can exploit vulnerabilities.” Hence, most security patches for websites don’t work.

Still, the remediation rate for all sites surveyed was 61% in 2012, the Web security firm found, compared to only 35% in 2007.

[Read Full Article]

Filed Under: Uncategorized

Hackers open malware backdoor in Apache webservers

2013/05/03 by admin

ComputerWeekly.com

Warwick Ashford

Tuesday 30 April 2013

A new threat is targeting Apache webservers, which are among the most widely-used webservers in the world, according to researchers at security firms ESET and Sucuri.

The threat is a highly advanced and stealthy backdoor being used to drive traffic to malicious websites carrying Blackhole exploit packs.

Researchers have named the backdoor Linux/Cdorked.A, and have described it as the most sophisticated Apache backdoor to date.

“The Linux/Cdorked.A backdoor does not leave traces on the hard-disk other than a modified httpd file, the daemon (or service) used by Apache,” said Pierre-Marc Bureau, ESET security intelligence program manager.

“All information related to the backdoor is stored in shared memory on the server, making detection difficult and hampering

[Read More]

Filed Under: antivirus, compliance, industry, Security News

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • Google Suspends Chinese Shopping App Amid Security Concerns
  • Verosint Launches Account Fraud Detection and Prevention Platform
  • Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement