Welcome!

News Feed Item

Paramount Defenses, One of the World's Top Cyber Security Companies, Announces Availability of Gold Finger 6.0, the World's Most Capable Active Directory Audit Tool, to Mitigate the World's #1 Cyber Security Risk

Gold Finger 6.0 empowers organizations worldwide to swiftly mitigate the world's #1 cyber security risk.

NEWPORT BEACH, Calif., Feb. 26, 2014 /PRNewswire/ -- Paramount Defenses, a global cyber security company founded and led by a former Microsoft cyber security expert, today announced the availability of Gold Finger 6.0, the world's most capable Active Directory Audit Tool and the world's most valuable cyber security solution.

Gold Finger 6.0 from Paramount Defenses - The World's Best Active Directory Audit Tool

DESIGNED TO ADDRESS THE WORLD'S #1 CYBER SECURITY RISK

From the U.S. Government to the Fortune 1000, the IT infrastructures of over 85% of organizations worldwide are powered by Microsoft's Windows Server platform.

In these IT infrastructures, at the very foundation of cyber security lies Microsoft's mission-critical Active Directory technology, the focal point of identity and access management and administrative delegation.

In these IT infrastructures, the entirety of an organization's user accounts and their passwords used for authentication, security groups and their memberships used to authorize access to all IT resources, and computer accounts and their security policies used to store and protect IT resources, are all stored, protected and managed in Active Directory.

Active Directory is thus the very foundation of organizational cyber security worldwide, because not just the proverbial keys to the kingdom, but in fact the proverbial keys to every lock, room and building in the kingdom lie in the Active Directory.

Given its vital role, the Active Directory itself is worthy of the highest protection because if the Active Directory itself is compromised, the entire organization instantly becomes vulnerable to compromise.

The #1 cyber security risk to Active Directory deployments and consequently the world's #1 cyber security is the risk posed by Active Directory Privilege Escalation, which involves a malicious perpetrator escalating their privilege by exploiting unauthorized access grants provisioned in Active Directory to gain administrative access in Active Directory and within minutes, using this access to gain control over the entire IT infrastructure.

This risk stems from the fact that there exist a large number of unauthorized effective access grants in most Active Directory deployments, which can potentially be identified and exploited by any insider to gain administrative access in Active Directory, and subsequently instantly access, modify, divulge or destroy virtually any or all organizational IT assets.

A PARAMOUNT CYBER SECURITY SOLUTION

Gold Finger is the world's only cyber security solution that can accurately identify exactly who has what authorized and unauthorized effective access granted in an organization's Active Directory deployment.

Its innovative, patented access assessment technology completely automates the determination of effective access in Active Directory. Automation gives organizations a substantial edge over malicious perpetrators because it lets them identify and lockdown all unauthorized access grants in Active Directory swiftly, before such grants can be identified and exploited by malicious perpetrators.

For most organizations, the timely availability of such valuable effective access insight can mean the difference between security and compromise.

Today Gold Finger is deployed in five continents worldwide, and it is used by the world's most important government and business organizations including the United States Government, the British Government, the Canadian Government, Microsoft, IBM, Google, and several other organizations worldwide.

UNAUTHORIZED ACCESS RELATED CYBER SECURITY BREACHES ON THE RISE

Cyber security breaches involving insiders identifying and exploiting unauthorized access grants to obtain elevated access rights and compromise organizational security are on a steady rise.

The recent theft and disclosure of vast amounts of highly classified information by Edward Snowden, a former U.S. government contractor may very well be the best example of just how much damage can be inflicted by just one such security breach.

It is believed that Snowden may have either already had or obtained and misused elevated access rights in Active Directory to obtain unauthorized access to vast amounts of highly classified information.

VERSION 6.0 DELIVERS THE SWIFTNESS THAT ORGANIZATION NEED

Version 6.0 substantially enhances the performance of Gold Finger's unique effective access audit algorithms, delivering up to a 5x gain in the speed with which Gold Finger can assess effective access, thus reducing the amount of time taken to analyze effective access by up to 90%.

The ability to obtain such paramount effective access insight swiftly gives organizations a formidable edge.

Version 6.0 also delivers select, high-value, capability enhancements that provide organizations the flexibility they need to efficiently and cost-effectively fulfill all their Active Directory related security, access and effective access audit needs.

The company also announced a new pricing model designed to make Gold Finger affordable for small, medium and large, private and public organizations worldwide.

For additional details on Gold Finger's unique effective access audit capabilities, its new pricing model, and to learn more about what's new in Gold Finger 6.0 please visit – http://www.paramountdefenses.com.

About Paramount Defenses

Paramount Defenses is privately held U.S. based Global Cyber Security Company engaged in the development of paramount cyber security defenses for organizations worldwide.

Today its customer-base spans five continents worldwide and its innovative cyber security solutions, powered by patented technology, uniquely fulfill a mission-critical global cyber security need.

Photo - http://photos.prnewswire.com/prnh/20140226/LA72356

SOURCE Paramount Defenses

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Struggling to keep up with increasing application demand? Learn how Platform as a Service (PaaS) can streamline application development processes and make resource management easy.
New Relic, Inc. has announced a set of new features across the New Relic Software Analytics Cloud that offer IT operations teams increased visibility, and the ability to diagnose and resolve performance problems quickly. The new features further IT operations teams’ ability to leverage data and analytics, as well as drive collaboration and a common, shared understanding between teams. Software teams are under pressure to resolve performance issues quickly and improve availability, as the comple...
The proper isolation of resources is essential for multi-tenant environments. The traditional approach to isolate resources is, however, rather heavyweight. In his session at 18th Cloud Expo, Igor Drobiazko, co-founder of elastic.io, will draw upon their own experience with operating a Docker container-based infrastructure on a large scale and present a lightweight solution for resource isolation using microservices. He will also discuss the implementation of microservices in data and applicat...
Join IBM June 8 at 18th Cloud Expo at the Javits Center in New York City, NY, and learn how to innovate like a startup and scale for the enterprise. You need to deliver quality applications faster and cheaper, attract and retain customers with an engaging experience across devices, and seamlessly integrate your enterprise systems. And you can't take 12 months to do it.
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, will discuss how research has demonstrated the value of Machine Learning in delivering next generation analytics to im...
This is not a small hotel event. It is also not a big vendor party where politicians and entertainers are more important than real content. This is Cloud Expo, the world's longest-running conference and exhibition focused on Cloud Computing and all that it entails. If you want serious presentations and valuable insight about Cloud Computing for three straight days, then register now for Cloud Expo.
As you respond to increasing requests for new analytics, you need fast and flexible technology in your arsenal so that you can deploy the right workload to the right platform for the need at hand. Do you need self-service and fast time to value? Do you have data and application control and privacy needs, along with strict SLAs to meet? IBM dashDB™ is data warehouse technology powered by in-memory computing and in-database analytics that are designed for fast results, scalability and more.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
IoT device adoption is growing at staggering rates, and with it comes opportunity for developers to meet consumer demand for an ever more connected world. Wireless communication is the key part of the encompassing components of any IoT device. Wireless connectivity enhances the device utility at the expense of ease of use and deployment challenges. Since connectivity is fundamental for IoT device development, engineers must understand how to overcome the hurdles inherent in incorporating multipl...
The paradigm has shifted. A Gartner survey shows that 43% of organizations are using or plan to implement the Internet of Things in 2016. However, not just a handful of companies are still using the old-style ad-hoc trial-and-error ways, unaware of the critical barriers, paint points, traps, and hidden roadblocks. How can you become a winner? In his session at @ThingsExpo, Tony Shan will present a methodical approach to guide the holistic adoption and enablement of IoT implementations. This ov...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...