Posts Tagged ‘Red Condor’

St. Bernard Acquires Red Condor

Today, my client Red Condor, was officially acquired by St. Bernard Software, a leader in Web security appliances. Below is an excerpt from the official press release:

The acquisition builds upon the success of St. Bernard’s existing hybrid platform, which has served the SME market through a combination of high-performance appliances, software, and hosted security solutions. With the Web security market expected to grow to $2.3 billion by 2012, and the protection of leading applications such as email and messaging remaining a primary concern across global enterprises of all sizes, the acquisition of Red Condor’s managed security solutions is a natural extension of St. Bernard’s product portfolio and business strategy.

“This acquisition milestone is a truly exciting time for both St. Bernard and Red Condor, as it creates great opportunities for growth with our shared hybrid security vision,” said Lou Ryan, President and CEO at St. Bernard. “The strategic match we have found in Red Condor establishes greater breadth and depth in our hosted, hybrid and on-premises options, and increases the overall value to our customers and partners. With the integration of Red Condor’s carrier-grade technology and platform, we are perfectly positioned to accelerate our growth engine and work with an increasing and diversified base of customers across multiple security solutions.”

Click here to read the entire announcement.


08 2010

Red Condor Bests Competitors in Independent Test of Email Filter Accuracy

Red Condor announced that an independent evaluation of appliance, SaaS (hosted) and hybrid email spam filtering solutions conducted by Miercom showed Red Condor’s Message Assurance Gateway (MAG) appliance and Vx Technology outperformed spam filters by Cloudmark, Message Labs/Symantec, MXLogic McAfee and Proofpoint. Miercom tested each filtering solution for spam filtering effectiveness based on content analysis accuracy, and the ability to protect against virus, adult content, phishing and other email-borne threats. Miercom also validated Red Condor’s hybrid technology, which combines an email appliance with a hosted service. The complete results of the test are available in a published report from Miercom for download or

Click here to read the entire news release.


07 2010

Corporate Ignorance of Phishing May Prove Catastrophic

In a new white paper addressing the mounting phishing problem, Red Condor asks the question, “What is the cost of corporate ignorance?” Recent widely publicized cyber attacks and industry research suggest that companies and their executives have ignored the phishing problem or even scoffed at the notion that phishing poses threats on par with traditional methods of corporate espionage. Red Condor’s paper suggests that companies must make security a part of everything they do and develop their products and services with a primary consideration on protecting their corporate data and customers’ information. When they fail to do so, the results can be catastrophic. Visit to download “Phishing for Disaster: the Cost of Corporate Ignorance.”


07 2010

Latest Email Attacks Prey on People’s Familiarity With the Web

Email security companies and their customers continue to battle the weakest link in email security as the latest email attacks prey on people’s trust in popular brands. These new attacks have the look and feel of trusted brands, increasing the likelihood that recipients will respond. Once easily identified as scams by way of poor design, multiple misspellings and grammatical errors, today’s spam and phishing attacks are so sophisticated and detailed that even experienced computer users fall victim to the scams. 

In the past year, Red Condor has blocked and warned the public about phishing, spear phishing and blended threat campaigns spoofing eBay, Adobe, YouTube, Amazon, Apple, BlueMountain eCards, craigslist, Facebook and Twitter — among other popular brands.

In addition to the installation of malware on unsuspecting users’ computers, these campaigns can have more insidious results, such as violation of social trust. For example, a Adobe malware campaign, a fake security alert that targeted users of Adobe Software, also spoofed email addresses of managers and other employees within a bogus email thread. This technique made the email appear to come from a trusted person in the organization, thus increasing the likelihood the recipient would follow the instructions in the email.

Click here to read the entire release.


06 2010

Red Condor Email Security Appliance Receives Network Products Guide Reader Trust Award for Best in Anti-Spam Solution

Red Condor announced that the editors of Network Products Guide have awarded the Red Condor Message Assurance Gateway (MAG) email security appliance the 2010 Best Products and Services Award. The Network Products Guide is the industry’s leading information technology research and advisory guide. The guide’s annual award honors products and services that meet the rapidly changing needs and interests of the end-users of technology worldwide. This year’s Best Products and Services were nominated by users from all over the world. 

Click here to read the entire release.


06 2010