MAHWAH, N.J., Sept. 26, 2014 (GLOBE NEWSWIRE) -- Radware® (Nasdaq:RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, announced its Security Operation Center with the assistance of Radware's Emergency Response Team (ERT) have provided full protection for its customers in response to vulnerabilities found in Bash (CVE-2014-6271, CVE-2014-7169).
Known as "Bash Bug" or "Shellshock", these vulnerabilities potentially affect certain services and applications and allow remote unauthenticated attackers to exploit this issue and use this flaw to override or bypass environment restrictions.
To provide both visibility and blocking of Shellshock exploits and to empower its customer base, Radware has created security technology on its entire Attack Mitigation System that includes DefensePro® and AppWall®. As an additional measure of security, Radware's ERT can also provide security assistance in real-time.
"Radware has worked around the clock to help mitigate this current vulnerability in order to keep our customers fully protected," says Gabi Malka, chief operating officer, Radware. "As we see this vulnerability currently live in the wild, our Emergency Response Team will continue to monitor this situation and will release additional protection and support as needed."
To help mitigate against Shellshock and additional information on this current threat, you can access Radware's latest ERT Threat Alert at http://security.radware.com/Threats-Attacks/Reports/.
Radware (Nasdaq:RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com.
Radware encourages you to join our community and follow us on; LinkedIn, Radware Blog, Twitter, YouTube, Radware Connect app for iPhone® and our new security center DDoSWarriors.com that provides a comprehensive analysis on DDoS attack tools, trends and threats.
©2014 Radware, Ltd. All rights reserved. Radware and all other Radware product and service names are registered trademarks or trademarks of Radware in the U.S. and other countries. All other trademarks and names are property of their respective owners.
This press release may contain statements concerning Radware's future prospects that are "forward-looking statements" under the Private Securities Litigation Reform Act of 1995. Statements preceded by, followed by, or that otherwise include the words "believes", "expects", "anticipates", "intends", "estimates", "plans", and similar expressions or future or conditional verbs such as "will", "should", "would", "may" and "could" are generally forward-looking in nature and not historical facts. These statements are based on current expectations and projections that involve a number of risks and uncertainties. There can be no assurance that future results will be achieved, and actual results could differ materially from forecasts and estimates. These risks and uncertainties, as well as others, are discussed in greater detail in Radware's Annual Report on Form 20-F and Radware's other filings with the Securities and Exchange Commission. Forward-looking statements speak only as of the date on which they are made and Radware undertakes no commitment to revise or update any forward-looking statement in order to reflect events or circumstances after the date any such statement is made. Radware's public filings are available from the Securities and Exchange Commission's website at www.sec.gov or may be obtained on Radware's website at www.radware.com.
CONTACT: Corporate Media Relations: Brian T. Gallagher +1 201 785-3206 (office) +1 201 574-3840 (cell) firstname.lastname@example.org