About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
LURHQ Debuts Threat Management Dashboard at CSI 2004
Monday, 8 November 2004 16:15 EST

Leading MSSP demonstrates client portal innovation, providing clients the ability to visualize security posture over time and compare security posture with other LURHQ clients.

Booth 1112, 31st Annual CSI Conference, Exhibition, WASHINGTON, November 8, 2004---LURHQ, the leader in Managed Security Services for security professionals, today announced general availability of its Threat Management Dashboard. A significant enhancement to LURHQ's industry-leading Sherlock Enterprise Security Portal interface, the Threat Management Dashboard provides LURHQ clients the ability to easily visualize their security posture over time, as well as compare the state of their security to that of other enterprise clients.

"One of the strongest value propositions an MSSP can provide is the unique ability to leverage knowledge gained from one client across all others," said LURHQ Chief Operating Officer Steven Drew. "Our Threat Management Dashboard takes that value proposition further by providing clients with the unique ability to compare the status of their information security posture with LURHQ's other leading enterprise clients."

The Threat Management Dashboard is the cornerstone of LURHQ's continuing innovation in advanced threat visualization and management. The customizable dashboard enables clients to quickly assess the status of their security posture in real-time, conduct trending analyses to view security posture over time, and perform comparative analyses to examine their security posture against that of other clients.

The dashboard provides clients with real-time integrated views of incidents, vulnerability scanning results, emerging threats and remediation statistics. This enables clients to analyze and assess the effectiveness of their security program and demonstrate provable security to management and auditors. To view the Threat Management Dashboard, visit http://www.lurhq.com/dashboard.html.

LURHQ's Sherlock Enterprise Security Portal consistently receives strong praise from current clients, prospective clients and industry thought leaders. The Portal is a fundamental component to LURHQ's OPEN Service Delivery methodology, which provides clients with real-time enterprise security visibility and service level transparency. Recognizing that traditional outsourcing delivery models were insufficient in the security industry, LURHQ pioneered this methodology to facilitate the formation of a true partnership with clients to better protect their enterprises. The result has been LURHQ's ability to deliver the most effective Managed Security Service in the market as demonstrated by the company's ability to consistently achieve client renewal rates in excess of 95 percent.

About LURHQ

LURHQ is the leading provider of Managed Security Services for security professionals. Founded in 1996, LURHQ empowers security professionals across its extensive base of enterprise clients through an integrated suite of Managed Security Services designed to deliver an effective Threat Management solution. Threat Management provides true protection by integrating scanning, intelligence, management and monitoring processes resulting in each process being more effective and efficient. Additionally, LURHQ's OPEN Service Delivery keeps clients in control and results in a true partnership for maximum protection. The combination of LURHQ's suite of services and service delivery methodology enables clients to enhance their security posture while reducing overall security program costs. For more information visit http://www.lurhq.com.

Contacts

Media:
Jim Engineer
e-Rainmaker PR for LURHQ Corporation
, mobile:


Analysts:
Rick Talford
LURHQ Corporation
x312




Featured Articles

Tribal thinking in today’s IT
George Santayana once famously observed; “Those who cannot remember the past are condemned to repeat it.”. But when it comes to IT security, a better way of thinking might be; “those who fail to understand the impact of the past on their thinking may find themselves somewhat exposed”…

You can’t manage what you can’t see!
Security threats have grown more menacing with the appearance of the likes of Sober, Mytob, and Bagle. Along with the newer trends of spyware, phishing and key logging the implications of ineffective information security have become potentially debilitating to business operations and indeed strategy.

The development and execution of an endpoint security strategy is an increasingly important and urgent issue for businesses of all sizes. Many are executing – or wanting to execute - flexible working practices and organisation models that leverage contemporary technology.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Phishing By The Numbers: 41,000 Blocked Sites in 2005
Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter