Cloud
3/18/2013
12:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ThreatTrack Security, Inc. Launches To Compete With FireEye In Advanced Malware Detection

GFI Software spins security business Unit into a separate company

Clearwater, Fla. – March 18, 2013 – ThreatTrack Security Inc. – formerly the Security Business Unit of GFI Software – today launched operations as an independent company dedicated to the analysis, detection and remediation of advanced malware threats. ThreatTrack Security enables organizations to identify and prevent Advanced Persistent Threats (APTs), targeted attacks and sophisticated malware designed to evade the traditional cyber-defenses deployed by enterprises, government agencies, and small and medium-sized businesses (SMBs) around the world.

"It's time for a new approach to malware defense," said Julian Waits, CEO of ThreatTrack Security. "APTs and other complex malware attacks have enterprises – especially those in globally competitive industries like finance, aerospace, healthcare, technology, and oil and gas exploration – struggling to ensure the integrity of their networks and intellectual property. Moreover, many enterprises lack the necessary tools to know with certainty if they are a victim of an APT or other advanced malware strike. ThreatTrack Security was established to help enterprises bolster their cybersecurity readiness right now."

Experience That Counts

ThreatTrack Security is different from the string of recent start-ups proposing untried security solutions and strategies to combat advanced cyber-threats. The company has more than a decade of experience analyzing and remediating malware, developing proven solutions that defend against the escalating sophistication of cybercrime, and it has built a proven track record of satisfying demanding customers on a global scale.

"In the coming months, ThreatTrack Security will unveil a new product roadmap that will augment our existing security solutions and enable us to deliver on our promise of a stronger, more secure enterprise cyber-defense," added Waits.

ThreatTrack Security solutions include:

ThreatAnalyzer&trade (formerly GFI SandBox) is an automated malware analysis sandbox that provides detailed malware behavioral reports to help enterprises defend against APTs, Zero-day threats and targeted attacks by analyzing files and URLs for malicious activity in a controlled, customizable environment. ThreatAnalyzer – increasingly deployed by enterprises nationwide – is used by government security, defense and intelligence agencies, making it an integral component of the U.S. cybersecurity infrastructure.

VIPRE® Business Premium is the company's most robust business antivirus solution that combines antivirus, integrated patch management, Mobile Device Management (MDM) and more to centrally manage and defend PCs, Macs, iPhones, iPads and Android devices. VIPRE Internet Security is the company's premier home antivirus software with anti-spyware and malware protection, automated updates for unpatched software, a firewall to stop malicious web traffic, an anti-spam filter and malicious website blocker. Millions of users worldwide trust VIPRE for their endpoint security.

ThreatIQ&trade provides the real-time malware intelligence that most enterprises lack. The service helps ensure that an enterprise's perimeter security defenses – such as firewalls, IDS/IPS, web filters and anti-spam products – identify and stop threats as they emerge. Customers receive continuous streams of malicious URLs and IP address, suspected files, phishing links and other malware data as it's discovered by ThreatTrack Security Labs.

In addition to a wide array of end-user customers – including large enterprises, government agencies, educational institutions, SMBs and consumers – dozens of OEMs and ISVs partner with ThreatTrack Security to harden their products with integrated malware defenses.

To learn more about ThreatTrack Security, visit www.ThreatTrackSecurity.com, call +1 888-243-4329 or send email to Sales@ThreatTrack.com.

About ThreatTrack Security Inc.

ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware that are designed to evade the traditional cyber-defenses deployed by enterprises, and small and medium-sized businesses (SMBs) around the world. The company develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats, including its ThreatAnalyzer malware behavioral analysis sandbox, VIPRE business and consumer antivirus software, and ThreatIQ real-time threat awareness service. Visit www.ThreatTrackSecurity.com to learn more.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8370
Published: 2015-01-29
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.

CVE-2015-0236
Published: 2015-01-29
libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.

CVE-2015-1043
Published: 2015-01-29
The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors.

CVE-2015-1044
Published: 2015-01-29
vmware-authd (aka the Authorization process) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allows attackers to cause a host OS denial of service via unspecified vectors.

CVE-2015-1422
Published: 2015-01-29
Multiple cross-site scripting (XSS) vulnerabilities in Gecko CMS 2.2 and 2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) horder[], (2) jak_catid, (3) jak_content, (4) jak_css, (5) jak_delete_log[], (6) jak_email, (7) jak_extfile, (8) jak_file, (9) jak_hookshow[], (10) j...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.