|By PR Newswire||
|February 26, 2014 12:30 PM EST||
NEWPORT BEACH, Calif., Feb. 26, 2014 /PRNewswire/ -- Paramount Defenses, a global cyber security company founded and led by a former Microsoft cyber security expert, today announced the availability of Gold Finger 6.0, the world's most capable Active Directory Audit Tool and the world's most valuable cyber security solution.
DESIGNED TO ADDRESS THE WORLD'S #1 CYBER SECURITY RISK
From the U.S. Government to the Fortune 1000, the IT infrastructures of over 85% of organizations worldwide are powered by Microsoft's Windows Server platform.
In these IT infrastructures, at the very foundation of cyber security lies Microsoft's mission-critical Active Directory technology, the focal point of identity and access management and administrative delegation.
In these IT infrastructures, the entirety of an organization's user accounts and their passwords used for authentication, security groups and their memberships used to authorize access to all IT resources, and computer accounts and their security policies used to store and protect IT resources, are all stored, protected and managed in Active Directory.
Active Directory is thus the very foundation of organizational cyber security worldwide, because not just the proverbial keys to the kingdom, but in fact the proverbial keys to every lock, room and building in the kingdom lie in the Active Directory.
Given its vital role, the Active Directory itself is worthy of the highest protection because if the Active Directory itself is compromised, the entire organization instantly becomes vulnerable to compromise.
The #1 cyber security risk to Active Directory deployments and consequently the world's #1 cyber security is the risk posed by Active Directory Privilege Escalation, which involves a malicious perpetrator escalating their privilege by exploiting unauthorized access grants provisioned in Active Directory to gain administrative access in Active Directory and within minutes, using this access to gain control over the entire IT infrastructure.
This risk stems from the fact that there exist a large number of unauthorized effective access grants in most Active Directory deployments, which can potentially be identified and exploited by any insider to gain administrative access in Active Directory, and subsequently instantly access, modify, divulge or destroy virtually any or all organizational IT assets.
A PARAMOUNT CYBER SECURITY SOLUTION
Gold Finger is the world's only cyber security solution that can accurately identify exactly who has what authorized and unauthorized effective access granted in an organization's Active Directory deployment.
Its innovative, patented access assessment technology completely automates the determination of effective access in Active Directory. Automation gives organizations a substantial edge over malicious perpetrators because it lets them identify and lockdown all unauthorized access grants in Active Directory swiftly, before such grants can be identified and exploited by malicious perpetrators.
For most organizations, the timely availability of such valuable effective access insight can mean the difference between security and compromise.
Today Gold Finger is deployed in five continents worldwide, and it is used by the world's most important government and business organizations including the United States Government, the British Government, the Canadian Government, Microsoft, IBM, Google, and several other organizations worldwide.
UNAUTHORIZED ACCESS RELATED CYBER SECURITY BREACHES ON THE RISE
Cyber security breaches involving insiders identifying and exploiting unauthorized access grants to obtain elevated access rights and compromise organizational security are on a steady rise.
The recent theft and disclosure of vast amounts of highly classified information by Edward Snowden, a former
It is believed that Snowden may have either already had or obtained and misused elevated access rights in Active Directory to obtain unauthorized access to vast amounts of highly classified information.
VERSION 6.0 DELIVERS THE SWIFTNESS THAT ORGANIZATION NEED
Version 6.0 substantially enhances the performance of Gold Finger's unique effective access audit algorithms, delivering up to a 5x gain in the speed with which Gold Finger can assess effective access, thus reducing the amount of time taken to analyze effective access by up to 90%.
The ability to obtain such paramount effective access insight swiftly gives organizations a formidable edge.
Version 6.0 also delivers select, high-value, capability enhancements that provide organizations the flexibility they need to efficiently and cost-effectively fulfill all their Active Directory related security, access and effective access audit needs.
The company also announced a new pricing model designed to make Gold Finger affordable for small, medium and large, private and public organizations worldwide.
For additional details on Gold Finger's unique effective access audit capabilities, its new pricing model, and to learn more about what's new in Gold Finger 6.0 please visit – http://www.paramountdefenses.com.
About Paramount Defenses
Paramount Defenses is privately held
Today its customer-base spans five continents worldwide and its innovative cyber security solutions, powered by patented technology, uniquely fulfill a mission-critical global cyber security need.
SOURCE Paramount Defenses
New Relic, Inc. has announced a set of new features across the New Relic Software Analytics Cloud that offer IT operations teams increased visibility, and the ability to diagnose and resolve performance problems quickly. The new features further IT operations teams’ ability to leverage data and analytics, as well as drive collaboration and a common, shared understanding between teams. Software teams are under pressure to resolve performance issues quickly and improve availability, as the comple...
Apr. 29, 2016 07:30 PM EDT Reads: 2,393
The proper isolation of resources is essential for multi-tenant environments. The traditional approach to isolate resources is, however, rather heavyweight. In his session at 18th Cloud Expo, Igor Drobiazko, co-founder of elastic.io, will draw upon their own experience with operating a Docker container-based infrastructure on a large scale and present a lightweight solution for resource isolation using microservices. He will also discuss the implementation of microservices in data and applicat...
Apr. 29, 2016 05:15 PM EDT Reads: 1,679
Join IBM June 8 at 18th Cloud Expo at the Javits Center in New York City, NY, and learn how to innovate like a startup and scale for the enterprise. You need to deliver quality applications faster and cheaper, attract and retain customers with an engaging experience across devices, and seamlessly integrate your enterprise systems. And you can't take 12 months to do it.
Apr. 29, 2016 04:30 PM EDT Reads: 1,757
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
Apr. 29, 2016 04:30 PM EDT Reads: 604
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, will discuss how research has demonstrated the value of Machine Learning in delivering next generation analytics to im...
Apr. 29, 2016 03:45 PM EDT Reads: 1,593
This is not a small hotel event. It is also not a big vendor party where politicians and entertainers are more important than real content. This is Cloud Expo, the world's longest-running conference and exhibition focused on Cloud Computing and all that it entails. If you want serious presentations and valuable insight about Cloud Computing for three straight days, then register now for Cloud Expo.
Apr. 29, 2016 03:30 PM EDT Reads: 1,651
As you respond to increasing requests for new analytics, you need fast and flexible technology in your arsenal so that you can deploy the right workload to the right platform for the need at hand. Do you need self-service and fast time to value? Do you have data and application control and privacy needs, along with strict SLAs to meet? IBM dashDB™ is data warehouse technology powered by in-memory computing and in-database analytics that are designed for fast results, scalability and more.
Apr. 29, 2016 03:15 PM EDT Reads: 1,530
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Apr. 29, 2016 03:07 PM EDT Reads: 232
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Apr. 29, 2016 03:00 PM EDT Reads: 838
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Apr. 29, 2016 02:45 PM EDT Reads: 835
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Apr. 29, 2016 02:30 PM EDT Reads: 1,397
IoT device adoption is growing at staggering rates, and with it comes opportunity for developers to meet consumer demand for an ever more connected world. Wireless communication is the key part of the encompassing components of any IoT device. Wireless connectivity enhances the device utility at the expense of ease of use and deployment challenges. Since connectivity is fundamental for IoT device development, engineers must understand how to overcome the hurdles inherent in incorporating multipl...
Apr. 29, 2016 02:30 PM EDT Reads: 1,397
The paradigm has shifted. A Gartner survey shows that 43% of organizations are using or plan to implement the Internet of Things in 2016. However, not just a handful of companies are still using the old-style ad-hoc trial-and-error ways, unaware of the critical barriers, paint points, traps, and hidden roadblocks. How can you become a winner? In his session at @ThingsExpo, Tony Shan will present a methodical approach to guide the holistic adoption and enablement of IoT implementations. This ov...
Apr. 29, 2016 02:00 PM EDT Reads: 1,533
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
Apr. 29, 2016 02:00 PM EDT Reads: 828