Analytics
10/25/2012
08:52 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

AlienVault Launches Threat Intelligence Resource Center & iOS Mobile Apps

AlienVault Open Minds Exchange provides, tools, and insights from the AlienVault security experts and community

San Mateo, Calif. – October 24, 2012 –AlienVault, the only open and collaborative Unified Security Management platform combining built-in controls and full visibility, today announced the formation of its Open Minds Exchange, a resource center housing the latest research, tools and insights from the AlienVault security experts and community. As part of the Open Minds Exchange, AlienVault has released two iOS applications – the AlienVault Mobile Console and AlienVault OTX Mobile – to put security visibility directly into users' hands wherever and whenever they need it.

"Advanced cyber attacks are occurring at a pace never before seen, and the only way the security community can prepare for and defend against them is by maintaining a steady exchange of intelligence and information," said Barmak Meftah, AlienVault CEO. "AlienVault has long been committed to leveraging collective security intelligence for the common good, and National Cyber Security Awareness Month is a good opportunity to recognize the power that comes when the community works together. The AlienVault mobile apps are another way for us to give users and the community immediate access to crowd-sourced security intelligence right at their fingertips wherever they are."

The AlienVault Open Minds Exchange provides visitors with the latest research, tools and insights from the AlienVault security experts and community, including:

· AlienVault iOS Mobile Apps: Available now and free on iTunes, the AlienVault Open Threat Exchange (OTX) mobile application puts real-time data on malicious IP addresses and domain actors directly in users hands. The AlienVault Mobile Console gives OSSIM orAlienVault Unified Security Management platform users mobile access to their AlienVault management console.

· AlienVault At-A-Glance Threat Analysis: Concise analyses of some of the most high profile threats uncovered by the AlienVault Labs research team via the AlienVault Labs Blog and the At-A-Glance analysis series, which gives CISOs the information they need to know in an easily digestible format.

· AlienVault OTX Threat Intelligence Data: Sourced from a community of more than 18,000 global AlienVault and OSSIM users, threat intelligence data from the AlienVault OTX feeds a real-time threat map, the open source IP reputation database and downloadable IP reputation database, infographics and other online resources accessible via the Open Minds Exchange.

"It's our goal to make security visibility and intelligence accessible to anyone," continued Meftah. "We believe the Open Minds Exchange will be a valuable resource for time and resource-strapped security practitioners and decision-makers who need quick access to the latest research and threat analysis."

Online Resources:

· Visit AlienVault's Open Minds Exchange.

· Read AlienVault's At-A-Glance: Internet Explorer Zero-Day Analysis

· Download the AlienVault OTX mobile app or the AlienVault Mobile Console for free on iTunes.

· Download OSSIM or participate in the OSSIM Community.

· Learn more about AlienVault's Unified Security Management platform.

About AlienVault

AlienVault provides organizations of all types and sizes with unprecedented visibility across the entire security 'stack' with the AlienVault Unified Security Management&trade (AV-USM&trade) platform. Based on OSSIM – the de facto standard open source SIEM created by AlienVault – the AV-USM platform has five essential security capabilities built-in: asset discovery, vulnerability assessment, threat detection, behavioral monitoring and security intelligence. The AlienVault Open Threat Exchange&trade, a system for sharing threat intelligence among OSSIM users and AlienVault customers, ensures AV-USM always stays ahead of threats. AlienVault is a privately held company headquartered in Silicon Valley and backed by Kleiner Perkins Caufield & Byers, Sigma, Trident Capital and Adara Venture Partners. For more information visit www.AlienVault.com or follow us on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.