Ottawa, Ontario (PRWEB) June 13, 2006
Third Brigade, Inc. (http://www.thirdbrigade.com) today announced that customers that have deployed Third Brigade Deep Security, its advanced Intrusion Prevention System (IPS), are protected from attacks which could exploit a wide range of critical vulnerabilities announced by Microsoft in their Security Bulletin for June, 2006. There are a total of eight critical vulnerabilities and they can allow an attacker to take control of an affected system if exploited successfully. This is the largest number of critical vulnerabilities announced in a monthly Microsoft security bulletin.
“These critical vulnerabilities affect software ranging from Windows services such as Routing and Remote Access, to applications such as Internet Explorer, Windows Media Player and Microsoft Office,” said Brian O’Higgins, Chief Technology Officer of Third Brigade. “Our ability to deliver protection for such a broad range of operating system and application software vulnerabilities proves the flexibility of our host-based deep packet inspection.”
Third Brigade customers automatically receive vulnerability shield updates from Third Brigade Security Center that protect recently disclosed vulnerabilities.
For the Microsoft Security Bulletin for June 2006, click here:
For Third Brigade security dispatches on this security bulletin, click here: http://www.thirdbrigade.com/labs.aspx?id=58
For information on Third Brigade Deep Security, click here: http://www.thirdbrigade.com/products/index.html
About Third Brigade
Third Brigade specializes in providing intrusion prevention systems (IPS) to health care, government, telecommunications, financial services and other organizations that need to prevent attacks that exploit vulnerabilities in commercial and custom software, including web applications. It enables you to create and enforce comprehensive security policies that proactively protect critical applications, sensitive data, and hosts, ensure regulatory compliance, and maximize the performance of your people, processes and hosts. Unlike other intrusion prevention systems, Third Brigade’s is not intrusive. It has been architected from the ground-up for intrusion prevention, and is smaller, faster and simpler. Third Brigade. That’s control.