nCircle Continues Marketing-leading Coverage Growth with More Than 25,000 Conditions



    Phenomenal growth represents 50% growth year over year, more than 8 times
nearest competitor
    

    
    SAN FRANCISCO, April 21 /CNW/ -- nCircle, the leader in automated
security and compliance auditing solutions, today announced that its solutions
now identify over 25,000 conditions, including operating systems,
applications, vulnerabilities and configurations. This market-leading figure
represents tremendous growth of more than 8,000 conditions in the past 12
months. The ability to accurately and non-intrusively identify all IP-enabled
systems on the network and their characteristics is the essential foundation
of an enterprise class security and compliance program.
    

    (Logo: http://www.newscom.com/cgi-bin/prnh/20051214/SFW028LOGO)

    
    nCircle's solutions gather detailed configuration and security
intelligence - often thousands of individual characteristics per system -
providing enterprise customers with the industry's most comprehensive
foundation for reducing security risk and ensuring compliance at the lowest
possible cost. The information is gathered by non-intrusively scanning hosts
and detailing certain identified "conditions", including the operating system,
applications, vulnerabilities, and configurations of each system. Each
condition can require one or several "checks", which carefully probe the
device and ensure an accurate system profile. nCircle solutions automate this
scanning process to provide a continuous, comprehensive view of the network
for improved security and compliance.
    

    
    nCircle VERT (Vulnerability and Exposures Research Team) develops, tests
and delivers an ever-growing library of condition checks including:
    
    --  Vulnerabilities - identifies software defects or system
        misconfigurations that may allow an attacker to gain increased system
        access or interfere with system operations. For example, the Conficker
        worm exploits the MS08-067 Remote Code Execution vulnerability.
    --  Configurations - identifies the configuration of an asset's operating
        system and applications, which can then be compared to benchmarks or
        policies to determine security and compliance. For example, "Guest
        account is disabled (Y/N)".
    --  Operating systems - identifies an asset's operating system, including
        version. For example, "Windows XP Service Pack 2".

    --  Applications - identifies the applications installed and running on an
        asset, including version. For example, "Oracle Database 10g XML DB
        FTP".


    
    nCircle VERT offers the industry's only Service Level Agreement (SLA)
providing customers vulnerability checks within 24 hours for all critical
Microsoft security advisories, reinforcing nCircle's commitment to help
organizations maintain the highest levels of security and compliance.
    

    
    "With coverage for more than 25,000 conditions, nCircle continues to
offer great value to customers as the only provider in our industry keeping
pace with the enterprise's growing needs for security and compliance," said
Sheldon Malm, Director of Security Research & Development, nCircle. "nCircle's
coverage has grown more than 50% in the past twelve months, more than 8 times
the growth of our nearest competitor."
    

    
    System and application configuration checks developed by nCircle VERT are
the building blocks of a rich library of policies used in nCircle solutions
and are based on standards and benchmarks from NIST, CIS and Microsoft.
Customers can use these policies to measure compliance with specific
regulations such as the PCI Data Security Standard, Sarbanes-Oxley and HIPAA.
    

    About nCircle Suite360
    
    nCircle provides the world's most comprehensive suite of solutions for
agentless security and configuration auditing. nCircle's solutions combine the
broadest discovery of networked systems and their operating systems,
applications, vulnerabilities and configurations with advanced analytics to
help enterprises reduce security risk and achieve compliance. nCircle's
solutions include IP360(TM) for vulnerability and risk management,
WebApp360(TM) for web application vulnerability auditing, Configuration
Compliance Manager (CCM)(TM) for configuration auditing and file integrity
monitoring, Certified PCI Scan Service(TM) for on-demand self-service PCI
scanning, and Suite360 Intelligence Hub(TM) for IT governance, risk and
compliance (ITGRC) reporting and analytics.
    

    About nCircle
    
    nCircle is the leading provider of automated security and compliance
auditing solutions. More than 4,000 enterprises, government agencies and
service providers around the world rely on nCircle's proactive solutions to
manage and reduce security risk and achieve compliance on their networks.
nCircle has won numerous awards for growth, innovation, customer satisfaction
and technology leadership.  nCircle is headquartered in San Francisco, CA,
with regional offices throughout the United States and in London and Toronto.
Additional information about nCircle is available at www.ncircle.com.
    

    
    nCircle is a registered trademark of nCircle Network Security, Inc. All
other registered or unregistered trademarks are the sole property of their
respective owners.
    




    




For further information:

For further information: Shelley Boose of Shev Rush PR, +1-408-398-6987,
for nCircle Web Site: http://www.ncircle.com

Organization Profile

NCIRCLE

More on this organization


Custom Packages

Browse our custom packages or build your own to meet your unique communications needs.

Start today.

CNW Membership

Fill out a CNW membership form or contact us at 1 (877) 269-7890

Learn about CNW services

Request more information about CNW products and services or call us at 1 (877) 269-7890