Echo Cybersecurity Extends Encryption Monitoring to Remote Desktop Services
Exton, PA (PRWEB) February 27, 2017
Pearl Software released Pearl Echo Version 12 R2, its flagship Internet monitoring and web filtering product. This latest release extends Pearl Echo’s Crypto.View™ technology to work in a multi-user and server-centric environment like Microsoft’s Remote Desktop Services (RDS) and Citrix’s XenServer. Echo Crypto.View provides administrators with full insight into encrypted communications including secure web (HTTPS) as well as secure email (SSL/TLS). Pearl’s patented real-time cyber threat suite includes the ability to monitor and control Internet communications that have been protected with encryption without jeopardizing the integrity of communication security. More about this topic...
Pearl Software adds support for administrators who are responsible for aligning cybersecurity policy with product capabilities.
Philadelphia, PA – December 8, 2016. Pearl Software's new NIST Guide provides organization policymakers with a road-map for satisfying portions of the Protect, Detect and Respond Functions of the NIST Framework for Improving Critical Infrastructure Cybersecurity. The Pearl Software NIST Guide fully supports an administrator’s efforts in documenting their cyber security policy. The NIST Framework helps organizations align their cybersecurity activities with their business requirements, risk tolerances and resources. The Pearl Software NIST Guide provides a tool to match Pearl Software’s cyber security product capabilities to NIST Framework categories. More about this topic...
Advanced Research of Technologies, Inc. to distribute Pearl Echo in Japan
Exton, PA – November 17, 2016 – Pearl Software, Inc. announced today it has entered into a distribution agreement with Advanced Research of Technologies, Inc. (ART). ART will distribute Pearl Software’s Internet visualization and filtering products in Japan. Pearl Software is an industry leader in the cyber security space and holds several patents for its ground breaking real-time, remote Internet monitoring and control technologies.
“Pearl Software is a leader in the US cyber security market and I believe that the products are going to be the industry standard in Japan based on their unique approach to securing user Internet access. We are pleased to provide our partners and the market with comprehensive Internet visualization and filtering solutions with the complete line of Pearl Software's products," said Yasunobu Kudo, president and CEO of ART. More about this topic...
The National Institute of Standards and Technology has published a self-assessment tool designed to help organizations gauge the impact and effectiveness of their cybersecurity risk management initiatives. The NIST Framework for Improving Critical Infrastructure Cybersecurity (the “Framework”) enables organizations to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure. The Framework is not intended to be a one-size-fits-all solution to cybersecuirity. Rather, the Framework will help an organization align its cybersecurity activities with its business requirements, risk tolerances, and resources.
Pearl Echo helps organizations satisfy portions of the Protect, Detect and Respond “Functions” of the Framework by focusing on the following Framework “Categories”: More about this topic...
Video conferencing, once the purview of the Fortune 500, has become ubiquitous thanks to the popularity of Skype and Facetime. But with most things Internet, there are frequently unintended consequences. Welcome the latest scam: The Romance Extortion.
In this scam, the target is lured into participating in cyber-sex using a webcam. The scammer records the video session and uses it to blackmail the target. Who would fall for that? Welcome Nebraska State Senator Bill Kintner.
Sen. Kintner began messaging with a woman who contacted him via his Facebook page. Their interaction grew over time from casual, to explicit, to the point where the woman convinced the married senator to contact her on Skype. While on travel, the senator used his state-issued laptop to engage in video cyber-sex. The woman soon after threatened to release the captured video unless the senator acquiesced to her extortion demands. Realizing he blew it, the senator decided to come clean and report his activity to state officials. Public officials in Nebraska who misuse state property can be charged with a misdemeanor. Sen. Kintner, perhaps due to his position, got off easy by paying a $1000 fine. More about this topic...
An FACC employee wired 50 million euros after receiving emailed instructions from someone posing as FACC’s CEO. This forced the company to report a financial loss to investors which would have otherwise shown net positive earnings. FACC, whose customers include Airbus (EPA: AIR), Boeing (NYSE: BA) and Dassault (AM:EN), fired its CEO after he "severely violated his duties". The company’s CFO was also terminated.
The scam is known as the “Fake President” fraud. By using a fake email address that resembles that of the President’s, the scammer convinces an employee, usually working in the finance department, to make an bank wire transfer to a third party on the grounds of a debt to pay, a provision in contract or a purchase deposit. The order is given with authority and urgency. The scammer has usually done enough research on the target company to give them the necessary arguments to convince the victim to act in accordance with the request. More about this topic...
Pearl Echo 12 Monitors and Controls Encrypted Communications
Philadelphia, PA – June 15, 2016 - Pearl Software released Echo Crypto.View™ as part of its latest line of Internet monitoring and web filtering products. Echo Crypto.View provides administrators with full insight into encrypted communications including secure web (HTTPS) as well as secure email (SSL). Pearl’s real-time and remote endpoint security suite includes the ability to safely monitor and control communications that have been protected with encryption without the use of complicated proxy servers or Internet traffic redirection. More about this topic...
Extensive Pearl Echo Block and Allow lists are typically not necessary when using Echo.Filters, our URL categorization database. Despite the size of your control lists, it’s advisable to properly format and maintain control lists to ensure peak efficiency at your managed endpoints.
The following brief video discusses managing your lists including proper use of wild cards: Managing Control Lists
Ref: All Tutorials
Pearl Echo is not a proxy server. Internet traffic will flow via the path that it normally does when Pearl Echo is not installed. The Pearl Echo workstation agent resident on an endpoint will only “echo” back data necessary for reporting; it also periodically gathers Internet access rules set for the user at the Pearl Echo server.
As an example of overhead, CNN.com will deliver over 10.5MB in content and images from their web page. Pearl Echo will log 9800 bytes to the Pearl Echo server. That’s less than 0.09% overhead! This is described pictorially in this video.
Those Famous Dirty Words
By pressing the "F3" key, Pearl Echo automatically searches the active log based on George Carlin's "Seven Dirty Words". For more information on this topic see http://www.pearlsoftware.com/help/carlin.htm.