www.fgks.org   »   [go: up one dir, main page]

8/31/2015
11:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FireHost Is Now Armor, for Active Cyber Defense Focused on Outcomes

Armor delivers dwell times 100 times shorter than the 205--day industry average

RICHARDSON, Texas – August 31, 2015 – A history of spending on security tools, followed by
subsequent breaches, has proven that traditional cybersecurity approaches have been ineffective against disrupting and neutralizing cyberattacks. To deliver the best possible security outcomes to customers, FireHost is expanding its vision and offerings under a new banner: Armor.

Through years of protecting customers through the FireHost Virtual Private Cloud (VPC), Armor repeatedly witnessed a critical industry problem. The typical security vendor remains one-­ dimensional: they sell on the premise that their specific tool is enough to protect customer environments. Unfortunately, most vendors offer little more than the latest tool — not true security outcomes. The result was end customers left to defend themselves and own all associated risk.

Armor’s investment and commitment, focused on threat intelligence, advanced technologies, industry-­leading techniques and talented professionals, are carefully crafted to bring customers these outcomes. Armor now will extend much of the security and benefits of the FireHost VPC — regardless of the underlying infrastructure — to a variety of environments.

Central to Armor’s expansion is Armor Anywhere, which delivers a proven cybersecurity solution to both public and private clouds, and customer-­owned IT. It currently includes two products — CORE and CORE+ — that help organizations balance internal VM security, cost-­effectiveness and cloud accessibility.

The industry-­leading FireHost VPC is now known as Armor Complete — a fully integrated secure managed cloud, which delivers security, support and high-­performance infrastructure via a single solution. Easily exceeding the strictest compliance requirements like PCI, HIPAA and HITRUST, Armor Complete continues its reputation as the world’s most secure managed cloud.

Armor delivers customers true security outcomes. Not just tools. Armor reduces the risk and
complexity associated with managing cyberthreats. And it’s through this approach that Armor’s new promise was born: between you and the threat.

Key Highlights
• FireHost is now Armor, an industry-­leading active cyber defense company
• Armor is delivering a unique vision and a new cybersecurity paradigm: true outcomes, not
security tools
• Armor is refining the foundation of its security strategy to include three integrated core
components: intelligence, defense and control
• Enhanced solution offerings include Armor Complete (VPC and Private Cloud) and Armor
Anywhere (CORE and CORE+), which work in concert to deliver the trio of security
components
• Armor delivers dwell times that are 100 times shorter than the industry average of
approximately 205 days
• Armor’s secure and managed cloud infrastructure is still central to how it delivers many
security controls, management and threat intelligence
• The technology and delivery of existing managed cloud infrastructure, security and
support remains unchanged
• Armor continues to exceed compliance requirements for the collection, storage and
transmission of sensitive data, allowing customers to achieve easy outcomes for PCI,
HIPAA and other industry and government compliance requirements

Quotes
Chris Drake, Founder & CEO | Armor
“For too long the industry stood idle watching the manifestation of a wide-­scale cybersecurity problem that forced organizations to procure, integrate and manage point solutions in-­house in an attempt to defend themselves from cyberattacks. This approach is expensive and grossly ineffective. The announcement of Armor is in direct response to today’s threat landscape and the logical evolution for our company to stand between our customers and the threats that seek to disrupt their businesses.”

Tarun Upaday, CTO | hCentive
“A determined focus on customer outcomes is a welcomed movement. As a security-­conscious organization, we improve our security posture by collaborating with the industry’s foremost cybersecurity experts. The fact that Armor is asking to share more of our risk and responsibilities is a testament to their leadership, solutions and dedication to delivering truly valuable security outcomes for our business.”

Michael Suby, VP of Research, Stratecast | Frost & Sullivan
“Enterprises are facing a growing challenge of sifting through myriad choices on where to host their workloads and how to effectively secure them. This is forcing them to elevate their security expertise. However, for many this is unattainable due to the shortage in information security talent, constantly evolving cyberthreats and an unsustainable number of security technologies that they have in place now but cannot manage reliably. Armor solves this dilemma by providing robust, holistic security solutions that span private and public clouds and private data centers. For enterprises, they can choose their workload-­hosting locations without uncertainty on how they will secure them.”

Geoff Waters, Vice President, Service Provider Channel | VMware
“Pushing the envelope — in both technology and problem-­solving — requires a great amount of vision, instinct and determination. As one of our vCloud Air Network partners, Armor understands what’s required to better protect end customers in the cloud. Their innovative spirit also led Armor to adopt VMware NSX network virtualization as the underlying platform for delivering security that is inherent to the infrastructure. As a valued Service Provider partner, we’re pleased they
selected VMworld 2015 to unveil the future of their business.”

Resources
• Armor.com
• Armor.com/evolution

About Armor
The leader in active cyber defense, Armor offers customer-­centric security outcomes for retail and eCommerce enterprises, healthcare organizations, payment leaders and financial institutions. Armor protects highly sensitive data for the most security-­conscious companies in the world. With its proven cybersecurity approach and proprietary cloud infrastructure built specifically for security, compliance and performance, responsible businesses choose Armor to reduce their risk.

For more information, visit armor.com or call 1-­844-­682-­2858.
Follow Armor
armor.com
twitter.com/armor
Media Contact
Melissa Felton
Vice President
Voce Communications for Armor
330.401.9220
ArmorTeam@vocecomm.com

VMware and VMware NSX are registered trademarks or trademarks of VMware, Inc. in the United States and other
jurisdictions. The use of the word “partner” or “partnership” does not imply a legal partnership relationship between
VMware and any other company.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9605
Published: 2015-09-04
WebUpgrade in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and create a system backup tarball, restart the server, or stop the filters on the server via a ' (single quote) character in the login and password parameters to webup...

CVE-2015-2990
Published: 2015-09-04
Directory traversal vulnerability in NEOJAPAN desknet NEO 2.0R1.0 through 2.5R1.4 allows remote authenticated users to read arbitrary files via a crafted parameter.

CVE-2015-2991
Published: 2015-09-04
Buffer overflow in NScripter before 3.00 allows remote attackers to execute arbitrary code via crafted save data.

CVE-2015-5612
Published: 2015-09-04
Cross-site scripting (XSS) vulnerability in October CMS build 271 and earlier allows remote attackers to inject arbitrary web script or HTML via the caption tag of a profile image.

CVE-2015-5688
Published: 2015-09-04
Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.