Welcome!

News Feed Item

Paramount Defenses, One of the World's Top Cyber Security Companies, Announces Availability of Gold Finger 6.0, the World's Most Capable Active Directory Audit Tool, to Mitigate the World's #1 Cyber Security Risk

Gold Finger 6.0 empowers organizations worldwide to swiftly mitigate the world's #1 cyber security risk.

NEWPORT BEACH, Calif., Feb. 26, 2014 /PRNewswire/ -- Paramount Defenses, a global cyber security company founded and led by a former Microsoft cyber security expert, today announced the availability of Gold Finger 6.0, the world's most capable Active Directory Audit Tool and the world's most valuable cyber security solution.

Gold Finger 6.0 from Paramount Defenses - The World's Best Active Directory Audit Tool

DESIGNED TO ADDRESS THE WORLD'S #1 CYBER SECURITY RISK

From the U.S. Government to the Fortune 1000, the IT infrastructures of over 85% of organizations worldwide are powered by Microsoft's Windows Server platform.

In these IT infrastructures, at the very foundation of cyber security lies Microsoft's mission-critical Active Directory technology, the focal point of identity and access management and administrative delegation.

In these IT infrastructures, the entirety of an organization's user accounts and their passwords used for authentication, security groups and their memberships used to authorize access to all IT resources, and computer accounts and their security policies used to store and protect IT resources, are all stored, protected and managed in Active Directory.

Active Directory is thus the very foundation of organizational cyber security worldwide, because not just the proverbial keys to the kingdom, but in fact the proverbial keys to every lock, room and building in the kingdom lie in the Active Directory.

Given its vital role, the Active Directory itself is worthy of the highest protection because if the Active Directory itself is compromised, the entire organization instantly becomes vulnerable to compromise.

The #1 cyber security risk to Active Directory deployments and consequently the world's #1 cyber security is the risk posed by Active Directory Privilege Escalation, which involves a malicious perpetrator escalating their privilege by exploiting unauthorized access grants provisioned in Active Directory to gain administrative access in Active Directory and within minutes, using this access to gain control over the entire IT infrastructure.

This risk stems from the fact that there exist a large number of unauthorized effective access grants in most Active Directory deployments, which can potentially be identified and exploited by any insider to gain administrative access in Active Directory, and subsequently instantly access, modify, divulge or destroy virtually any or all organizational IT assets.

A PARAMOUNT CYBER SECURITY SOLUTION

Gold Finger is the world's only cyber security solution that can accurately identify exactly who has what authorized and unauthorized effective access granted in an organization's Active Directory deployment.

Its innovative, patented access assessment technology completely automates the determination of effective access in Active Directory. Automation gives organizations a substantial edge over malicious perpetrators because it lets them identify and lockdown all unauthorized access grants in Active Directory swiftly, before such grants can be identified and exploited by malicious perpetrators.

For most organizations, the timely availability of such valuable effective access insight can mean the difference between security and compromise.

Today Gold Finger is deployed in five continents worldwide, and it is used by the world's most important government and business organizations including the United States Government, the British Government, the Canadian Government, Microsoft, IBM, Google, and several other organizations worldwide.

UNAUTHORIZED ACCESS RELATED CYBER SECURITY BREACHES ON THE RISE

Cyber security breaches involving insiders identifying and exploiting unauthorized access grants to obtain elevated access rights and compromise organizational security are on a steady rise.

The recent theft and disclosure of vast amounts of highly classified information by Edward Snowden, a former U.S. government contractor may very well be the best example of just how much damage can be inflicted by just one such security breach.

It is believed that Snowden may have either already had or obtained and misused elevated access rights in Active Directory to obtain unauthorized access to vast amounts of highly classified information.

VERSION 6.0 DELIVERS THE SWIFTNESS THAT ORGANIZATION NEED

Version 6.0 substantially enhances the performance of Gold Finger's unique effective access audit algorithms, delivering up to a 5x gain in the speed with which Gold Finger can assess effective access, thus reducing the amount of time taken to analyze effective access by up to 90%.

The ability to obtain such paramount effective access insight swiftly gives organizations a formidable edge.

Version 6.0 also delivers select, high-value, capability enhancements that provide organizations the flexibility they need to efficiently and cost-effectively fulfill all their Active Directory related security, access and effective access audit needs.

The company also announced a new pricing model designed to make Gold Finger affordable for small, medium and large, private and public organizations worldwide.

For additional details on Gold Finger's unique effective access audit capabilities, its new pricing model, and to learn more about what's new in Gold Finger 6.0 please visit – http://www.paramountdefenses.com.

About Paramount Defenses

Paramount Defenses is privately held U.S. based Global Cyber Security Company engaged in the development of paramount cyber security defenses for organizations worldwide.

Today its customer-base spans five continents worldwide and its innovative cyber security solutions, powered by patented technology, uniquely fulfill a mission-critical global cyber security need.

Photo - http://photos.prnewswire.com/prnh/20140226/LA72356

SOURCE Paramount Defenses

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Le...
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Machine learning provides predictive models which a business can apply in countless ways to better understand its customers and operations. Since machine learning was first developed with flat, tabular data in mind, it is still not widely understood: when does it make sense to use graph databases and machine learning in combination? This talk tackles the question from two ends: classifying predictive analytics methods and assessing graph database attributes. It also examines the ongoing lifecycl...
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling independent service deployments. In this presentation we'll provide an overview of the tools, patterns and pain points we've seen when implementing contract testing in large development organizations.
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will d...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...