|By PR Newswire||
|February 26, 2014 12:30 PM EST||
NEWPORT BEACH, Calif., Feb. 26, 2014 /PRNewswire/ -- Paramount Defenses, a global cyber security company founded and led by a former Microsoft cyber security expert, today announced the availability of Gold Finger 6.0, the world's most capable Active Directory Audit Tool and the world's most valuable cyber security solution.
DESIGNED TO ADDRESS THE WORLD'S #1 CYBER SECURITY RISK
From the U.S. Government to the Fortune 1000, the IT infrastructures of over 85% of organizations worldwide are powered by Microsoft's Windows Server platform.
In these IT infrastructures, at the very foundation of cyber security lies Microsoft's mission-critical Active Directory technology, the focal point of identity and access management and administrative delegation.
In these IT infrastructures, the entirety of an organization's user accounts and their passwords used for authentication, security groups and their memberships used to authorize access to all IT resources, and computer accounts and their security policies used to store and protect IT resources, are all stored, protected and managed in Active Directory.
Active Directory is thus the very foundation of organizational cyber security worldwide, because not just the proverbial keys to the kingdom, but in fact the proverbial keys to every lock, room and building in the kingdom lie in the Active Directory.
Given its vital role, the Active Directory itself is worthy of the highest protection because if the Active Directory itself is compromised, the entire organization instantly becomes vulnerable to compromise.
The #1 cyber security risk to Active Directory deployments and consequently the world's #1 cyber security is the risk posed by Active Directory Privilege Escalation, which involves a malicious perpetrator escalating their privilege by exploiting unauthorized access grants provisioned in Active Directory to gain administrative access in Active Directory and within minutes, using this access to gain control over the entire IT infrastructure.
This risk stems from the fact that there exist a large number of unauthorized effective access grants in most Active Directory deployments, which can potentially be identified and exploited by any insider to gain administrative access in Active Directory, and subsequently instantly access, modify, divulge or destroy virtually any or all organizational IT assets.
A PARAMOUNT CYBER SECURITY SOLUTION
Gold Finger is the world's only cyber security solution that can accurately identify exactly who has what authorized and unauthorized effective access granted in an organization's Active Directory deployment.
Its innovative, patented access assessment technology completely automates the determination of effective access in Active Directory. Automation gives organizations a substantial edge over malicious perpetrators because it lets them identify and lockdown all unauthorized access grants in Active Directory swiftly, before such grants can be identified and exploited by malicious perpetrators.
For most organizations, the timely availability of such valuable effective access insight can mean the difference between security and compromise.
Today Gold Finger is deployed in five continents worldwide, and it is used by the world's most important government and business organizations including the United States Government, the British Government, the Canadian Government, Microsoft, IBM, Google, and several other organizations worldwide.
UNAUTHORIZED ACCESS RELATED CYBER SECURITY BREACHES ON THE RISE
Cyber security breaches involving insiders identifying and exploiting unauthorized access grants to obtain elevated access rights and compromise organizational security are on a steady rise.
The recent theft and disclosure of vast amounts of highly classified information by Edward Snowden, a former
It is believed that Snowden may have either already had or obtained and misused elevated access rights in Active Directory to obtain unauthorized access to vast amounts of highly classified information.
VERSION 6.0 DELIVERS THE SWIFTNESS THAT ORGANIZATION NEED
Version 6.0 substantially enhances the performance of Gold Finger's unique effective access audit algorithms, delivering up to a 5x gain in the speed with which Gold Finger can assess effective access, thus reducing the amount of time taken to analyze effective access by up to 90%.
The ability to obtain such paramount effective access insight swiftly gives organizations a formidable edge.
Version 6.0 also delivers select, high-value, capability enhancements that provide organizations the flexibility they need to efficiently and cost-effectively fulfill all their Active Directory related security, access and effective access audit needs.
The company also announced a new pricing model designed to make Gold Finger affordable for small, medium and large, private and public organizations worldwide.
For additional details on Gold Finger's unique effective access audit capabilities, its new pricing model, and to learn more about what's new in Gold Finger 6.0 please visit – http://www.paramountdefenses.com.
About Paramount Defenses
Paramount Defenses is privately held
Today its customer-base spans five continents worldwide and its innovative cyber security solutions, powered by patented technology, uniquely fulfill a mission-critical global cyber security need.
SOURCE Paramount Defenses
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Feb. 20, 2017 11:30 AM EST Reads: 1,719
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Feb. 20, 2017 11:30 AM EST Reads: 329
Have you ever noticed how some IT people seem to lead successful, rewarding, and satisfying lives and careers, while others struggle? IT author and speaker Don Crawley uncovered the five principles that successful IT people use to build satisfying lives and careers and he shares them in this fast-paced, thought-provoking webinar. You'll learn the importance of striking a balance with technical skills and people skills, challenge your pre-existing ideas about IT customer service, and gain new in...
Feb. 20, 2017 11:30 AM EST Reads: 1,781
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
Feb. 20, 2017 11:30 AM EST Reads: 223
Cloud Expo, Inc. has announced today that Aruna Ravichandran, vice president of DevOps Product and Solutions Marketing at CA Technologies, has been named co-conference chair of DevOps at Cloud Expo 2017. The @DevOpsSummit at Cloud Expo New York will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and @DevOpsSummit at Cloud Expo Silicon Valley will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 20, 2017 11:15 AM EST Reads: 959
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, I provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading the...
Feb. 20, 2017 11:15 AM EST Reads: 7,860
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
Feb. 20, 2017 11:00 AM EST Reads: 841
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Feb. 20, 2017 10:45 AM EST Reads: 807
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
Feb. 20, 2017 10:45 AM EST Reads: 5,979
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Feb. 20, 2017 10:15 AM EST Reads: 265
TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets. By creating abundant, high-quality editorial content across more than 140 highly targeted technology-specific websites, TechTarget attracts and nurtures communities of technology buyers researching their companies' information technology needs. By understanding these buyers' content consumption behaviors, TechTarget creates the purchase inte...
Feb. 20, 2017 10:15 AM EST Reads: 891
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business. Though, IoT is far more complex than most firms expected with a majority of IoT projects having failed. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, Chief IoTologist at Wipro, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology portfolios and business models to adopt and leverage IoT. He will delve in...
Feb. 20, 2017 09:30 AM EST Reads: 1,181
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Feb. 20, 2017 09:30 AM EST Reads: 172
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain.
Feb. 20, 2017 09:15 AM EST Reads: 363
Tricky charts and visually deceptive graphs often make a case for the impact IT performance has on business. The debate isn't around the obvious; of course, IT performance metrics like website load time influence business metrics such as conversions and revenue. Rather, this presentation will explore various data analysis concepts to understand how, and how not to, assert such correlations. In his session at 20th Cloud Expo, Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Sys...
Feb. 20, 2017 09:00 AM EST Reads: 1,198