Analytics
10/25/2012
08:52 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

AlienVault Launches Threat Intelligence Resource Center & iOS Mobile Apps

AlienVault Open Minds Exchange provides, tools, and insights from the AlienVault security experts and community

San Mateo, Calif. – October 24, 2012 –AlienVault, the only open and collaborative Unified Security Management platform combining built-in controls and full visibility, today announced the formation of its Open Minds Exchange, a resource center housing the latest research, tools and insights from the AlienVault security experts and community. As part of the Open Minds Exchange, AlienVault has released two iOS applications – the AlienVault Mobile Console and AlienVault OTX Mobile – to put security visibility directly into users' hands wherever and whenever they need it.

"Advanced cyber attacks are occurring at a pace never before seen, and the only way the security community can prepare for and defend against them is by maintaining a steady exchange of intelligence and information," said Barmak Meftah, AlienVault CEO. "AlienVault has long been committed to leveraging collective security intelligence for the common good, and National Cyber Security Awareness Month is a good opportunity to recognize the power that comes when the community works together. The AlienVault mobile apps are another way for us to give users and the community immediate access to crowd-sourced security intelligence right at their fingertips wherever they are."

The AlienVault Open Minds Exchange provides visitors with the latest research, tools and insights from the AlienVault security experts and community, including:

· AlienVault iOS Mobile Apps: Available now and free on iTunes, the AlienVault Open Threat Exchange (OTX) mobile application puts real-time data on malicious IP addresses and domain actors directly in users hands. The AlienVault Mobile Console gives OSSIM orAlienVault Unified Security Management platform users mobile access to their AlienVault management console.

· AlienVault At-A-Glance Threat Analysis: Concise analyses of some of the most high profile threats uncovered by the AlienVault Labs research team via the AlienVault Labs Blog and the At-A-Glance analysis series, which gives CISOs the information they need to know in an easily digestible format.

· AlienVault OTX Threat Intelligence Data: Sourced from a community of more than 18,000 global AlienVault and OSSIM users, threat intelligence data from the AlienVault OTX feeds a real-time threat map, the open source IP reputation database and downloadable IP reputation database, infographics and other online resources accessible via the Open Minds Exchange.

"It's our goal to make security visibility and intelligence accessible to anyone," continued Meftah. "We believe the Open Minds Exchange will be a valuable resource for time and resource-strapped security practitioners and decision-makers who need quick access to the latest research and threat analysis."

Online Resources:

· Visit AlienVault's Open Minds Exchange.

· Read AlienVault's At-A-Glance: Internet Explorer Zero-Day Analysis

· Download the AlienVault OTX mobile app or the AlienVault Mobile Console for free on iTunes.

· Download OSSIM or participate in the OSSIM Community.

· Learn more about AlienVault's Unified Security Management platform.

About AlienVault

AlienVault provides organizations of all types and sizes with unprecedented visibility across the entire security 'stack' with the AlienVault Unified Security Management&trade (AV-USM&trade) platform. Based on OSSIM – the de facto standard open source SIEM created by AlienVault – the AV-USM platform has five essential security capabilities built-in: asset discovery, vulnerability assessment, threat detection, behavioral monitoring and security intelligence. The AlienVault Open Threat Exchange&trade, a system for sharing threat intelligence among OSSIM users and AlienVault customers, ensures AV-USM always stays ahead of threats. AlienVault is a privately held company headquartered in Silicon Valley and backed by Kleiner Perkins Caufield & Byers, Sigma, Trident Capital and Adara Venture Partners. For more information visit www.AlienVault.com or follow us on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.