Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

9/23/2019
05:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Comcast Business Launches Cloud-Based Security Service

Comcast Business SecurityEdge debuts.

PHILADELPHIA – Sept. 23, 2019 – Comcast Business today announced the launch of its new cloud-based internet security solution, specifically engineered to help small businesses effectively manage the growing risk of cyberattacks. Comcast Business SecurityEdge™ works to protect devices connected to a business’ WiFi network against several existing and emerging Internet-related threats, including malware, ransomware, phishing and botnet infections, without requiring additional hardware or software beyond the Comcast Business Internet modem.

In today’s hyper-connected world, cyberthreats are becoming more sophisticated and prevalent. No organization is too large or too small to be a target. In fact, nearly half of small businesses in the United States suffered a cyberattack in 2017, according to a recent study.

“Cybersecurity keeps business owners up at night because they face an onslaught of challenges, from various, ever-changing forms of cyberthreats that can result in the loss of sensitive information or the disruption of business operations,” said Shena Tharnish, Vice President, Cybersecurity Products, Comcast Business. “Comcast Business SecurityEdge – a simple yet powerful solution – can help defend companies and their data from serious harm by protecting all devices connected to the network at an affordable price.”

Comcast Business’ internet security solution, developed in partnership with Akamai, a leading cybersecurity provider, blocks access to compromised or malicious domains, which helps prevent business owners, employees, or guests from accessing an infected internet site. Businesses also have the ability to filter web content – gaining more visibility into their network safety with a simple to use, personalized dashboard that provides regular reporting.

Comcast Business SecurityEdge also addresses small business concerns about the cost and complexity of deploying cybersecurity solutions. The innovative technology is built into existing hardware, offering businesses an all-in-one solution that requires no additional equipment, or setup. It automatically covers all connected devices, from mobile phones to wireless printers, without requiring software installations on each device. The cloud-based solution updates internet domain threats every 10 minutes, so companies can be protected from the latest threats with no need for manual downloads or software updates.

To learn more about Comcast Business SecurityEdge and other security solutions, please visit: www.comcastbusiness.com/securityedge

About Comcast Business
Comcast Business offers Ethernet, Internet, Wi-Fi, Voice, TV and Managed Enterprise Solutions to help organizations of all sizes transform their business. Powered by an advanced network, and backed by 24/7 customer support, Comcast Business is one of the largest contributors to the growth of Comcast Cable. Comcast Business is the nation’s largest cable provider to small and mid-size businesses and has emerged as a force in the Enterprise market; recognized over the last two years by leading industry associations as one of the fastest growing providers of Ethernet services.

For more information, call 866-429-3085. Follow on Twitter @ComcastBusiness and on other social media networks at http://business.comcast.com/social.


# # #

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4108
PUBLISHED: 2019-11-14
Multiple unspecified vulnerabilities in Cryptocat Project Cryptocat 2.0.18 have unknown impact and attack vectors.
CVE-2018-12207
PUBLISHED: 2019-11-14
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
CVE-2019-0117
PUBLISHED: 2019-11-14
Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 & E-2200 Processor Families with Intel(R) Processor Graphics may allow a ...
CVE-2019-0123
PUBLISHED: 2019-11-14
Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2019-0124
PUBLISHED: 2019-11-14
Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting TXT, may allow a privileged user to potentially enable escalation of privilege via local access.