Network Appliance and CyberGuard Release Protection Against Cross-Platform Spyware Threat - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Infrastructure

Network Appliance and CyberGuard Release Protection Against Cross-Platform Spyware Threat

Firms say their Internet Access and Security solution can defend enterprises against the Exploit Byte-Verify cross-platform spyware threat.

Network Appliance Inc. and CyberGuard Corporation announced that their jointly-marketed Internet Access and Security (IAS) solution can defend enterprises against the Exploit Byte-Verify cross-platform spyware threat recently identified by VitalSecurity.org.

The Exploit Byte-Verify attack is unique in that it can infect Microsoft Internet Explorer and install spyware on compromised systems regardless of whether that browser or another one such as Firefox is actually in use. The attack takes advantage of a vulnerability in Sun Microsystems' Java Virtual Machine to execute digitally signed applets with access to all system resources on the target machine. The code downloads Trojans and spyware and alters Internet Explorer's security settings.

According to the companies, Network Appliance's NetApp IAS, which employs the NetCache appliance and CyberGuard's Webwasher content security suite, protects users by filtering malicious code. The Webwasher suite detects scripts as they try to exploit the Java vulnerability and blocks it at the gateway.

"As a company focused on protecting enterprises against the most serious and critical vulnerabilities as their security needs grow, it is critical to work with companies like NetApp to pace the industry with the most comprehensive security solutions," CyberGuard's senior vice president of strategic alliances and general manager of the Webwasher subsidiary Horst Joepen said in a statement. "This new threat is only the latest in a series of attacks where the new proactive filtering technology included in our Webwasher suite provides protection and improves Internet security for enterprise customers."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
Strategies You Need to Make Digital Transformation Work
Joao-Pierre S. Ruth, Senior Writer,  11/25/2019
Commentary
Enterprise Guide to Data Privacy
Cathleen Gagne, Managing Editor, InformationWeek,  11/22/2019
News
Watch Out: 7 Digital Disruptions for IT Leaders
Jessica Davis, Senior Editor, Enterprise Apps,  11/18/2019
White Papers
Register for InformationWeek Newsletters
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Slideshows
Flash Poll