Press release

Adlumin Launches Perimeter Defense Feature

0
Sponsored by Businesswire

Earlier this month, Adlumin announced its new Perimeter Defense feature that will give customers direct insight into their networks from the perspective of an attacker.

With Perimeter Defense, all internet-facing servers, DMZs, and ATM networks are scanned and continuously monitored for changes, misconfigurations and vulnerabilities. The first attribute of Adlumin’s Perimeter Defense to go live was port monitoring. From the Perimeter Defense management page, customers can simply add the IP addresses or IP ranges of their high-value assets and networks, select a severity level and Adlumin will monitor those assets for any port configuration changes.

“Our new Perimeter Defense feature is unique because it gives our customers valuable data about their network from the viewpoint of an attacker,” explains Dan McQuade, Director of Application Development. “We plan to continue adding features and functionality to Perimeter Defense to ensure that customers can develop a deeper understanding of their overall network health and further to strengthen the security of their internet-facing networks and devices.”

Within the platform, users can find the Perimeter Defense management page under the Modules dropdown menu. Additional features and functionality will be coming to Perimeter Defense within the coming weeks and users will receive email notifications once new features go live. Perimeter Defense joins the list of new Adlumin features debuting this year, aiming to serve the company’s primary goal: revolutionize the way organizations secure sensitive data.

About Adlumin

Adlumin Inc. is a patented security and compliance automation platform for the financial sector. The Adlumin team has a passion for technology and solving the most difficult problems through the targeted application of data science and compliance integration. Our mission is to “add luminosity” or visibility to every customer’s network processes through real-time threat detection, analysis, and response to ensure sensitive data remains secure.