Decisive Security IntelligenceDecisive Security Intelligence We Don't Stumble Upon Threats, We Seek Them Out.
Sec_Intel_100512.png

With information security breaches on the rise and new vulnerabilities developing every day, it is imperative that organizations are adequately informed to defend against these threats. 

While technology is an important element to detecting vulnerabilities, having a vigilant and responsive team of security experts is a unique benefit offered by DDI.  Our dedicated Vulnerability Research Team (VRT) and certified Security Analysts are thought leaders in the information security industry.  Through our Decisive Security Intelligence, you can be properly armed to defend against potential threats that could impact the security of your organization.

Our Decisive Security Intelligence is delivered in multiple ways:

  • Proactive Data Mining - Our VRT further reinforces your security by mining aggregate data and identifying potential threats to the DDI community of clients and beyond.  Acting on this valuable information, clients can respond quickly to thwart potential security breaches. 
  • DDI Insight™ - An annual, benchmark study, offered exclusively through DDI, Insight allows you a keen perspective to inform your initiatives surrounding information security.
  • Managed Service Solutions - DDI’s managed solutions come with an assigned Personal Security Analyst (PSA).  Unlike other tool providers, our PSAs offer the industry expertise to guide your assessment and remediation efforts and we will be with you every step of the way as you develop strategies to ensure your valuable data is safeguarded.

So, what can Decisive Security Intelligence mean to you? If you are a DDI client, you can rest assured you will receive the highest and most current intelligence available to arm yourself against the ever-changing threats to your organization’s security.

Alert Center

12/17/2014 » CVE-2014-4626
EMC Documentum Content Server before 6.7 SP1 P29, 6.7 SP2 before P18, 7.0 before P16, and 7.1 before P09 allows remote authenticated users to gain privileges by (1) placing a command in a dm_job object and setting this object's owner to a privileged user or placing a rename action in a dm_job_request object and waiting for a (2) dm_UserRename or (3) dm_GroupRename service task, aka ESA-2014-105. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2515. [READ ME]

Visit DDI Alert Center