Cloud
3/18/2013
12:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ThreatTrack Security, Inc. Launches To Compete With FireEye In Advanced Malware Detection

GFI Software spins security business Unit into a separate company

Clearwater, Fla. – March 18, 2013 – ThreatTrack Security Inc. – formerly the Security Business Unit of GFI Software – today launched operations as an independent company dedicated to the analysis, detection and remediation of advanced malware threats. ThreatTrack Security enables organizations to identify and prevent Advanced Persistent Threats (APTs), targeted attacks and sophisticated malware designed to evade the traditional cyber-defenses deployed by enterprises, government agencies, and small and medium-sized businesses (SMBs) around the world.

"It's time for a new approach to malware defense," said Julian Waits, CEO of ThreatTrack Security. "APTs and other complex malware attacks have enterprises – especially those in globally competitive industries like finance, aerospace, healthcare, technology, and oil and gas exploration – struggling to ensure the integrity of their networks and intellectual property. Moreover, many enterprises lack the necessary tools to know with certainty if they are a victim of an APT or other advanced malware strike. ThreatTrack Security was established to help enterprises bolster their cybersecurity readiness right now."

Experience That Counts

ThreatTrack Security is different from the string of recent start-ups proposing untried security solutions and strategies to combat advanced cyber-threats. The company has more than a decade of experience analyzing and remediating malware, developing proven solutions that defend against the escalating sophistication of cybercrime, and it has built a proven track record of satisfying demanding customers on a global scale.

"In the coming months, ThreatTrack Security will unveil a new product roadmap that will augment our existing security solutions and enable us to deliver on our promise of a stronger, more secure enterprise cyber-defense," added Waits.

ThreatTrack Security solutions include:

ThreatAnalyzer&trade (formerly GFI SandBox) is an automated malware analysis sandbox that provides detailed malware behavioral reports to help enterprises defend against APTs, Zero-day threats and targeted attacks by analyzing files and URLs for malicious activity in a controlled, customizable environment. ThreatAnalyzer – increasingly deployed by enterprises nationwide – is used by government security, defense and intelligence agencies, making it an integral component of the U.S. cybersecurity infrastructure.

VIPRE® Business Premium is the company's most robust business antivirus solution that combines antivirus, integrated patch management, Mobile Device Management (MDM) and more to centrally manage and defend PCs, Macs, iPhones, iPads and Android devices. VIPRE Internet Security is the company's premier home antivirus software with anti-spyware and malware protection, automated updates for unpatched software, a firewall to stop malicious web traffic, an anti-spam filter and malicious website blocker. Millions of users worldwide trust VIPRE for their endpoint security.

ThreatIQ&trade provides the real-time malware intelligence that most enterprises lack. The service helps ensure that an enterprise's perimeter security defenses – such as firewalls, IDS/IPS, web filters and anti-spam products – identify and stop threats as they emerge. Customers receive continuous streams of malicious URLs and IP address, suspected files, phishing links and other malware data as it's discovered by ThreatTrack Security Labs.

In addition to a wide array of end-user customers – including large enterprises, government agencies, educational institutions, SMBs and consumers – dozens of OEMs and ISVs partner with ThreatTrack Security to harden their products with integrated malware defenses.

To learn more about ThreatTrack Security, visit www.ThreatTrackSecurity.com, call +1 888-243-4329 or send email to Sales@ThreatTrack.com.

About ThreatTrack Security Inc.

ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware that are designed to evade the traditional cyber-defenses deployed by enterprises, and small and medium-sized businesses (SMBs) around the world. The company develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats, including its ThreatAnalyzer malware behavioral analysis sandbox, VIPRE business and consumer antivirus software, and ThreatIQ real-time threat awareness service. Visit www.ThreatTrackSecurity.com to learn more.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3407
Published: 2014-11-27
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.

CVE-2014-4829
Published: 2014-11-27
Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allows remote attackers to hijack the authentication of arbitrary users for requests tha...

CVE-2014-4831
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to hijack sessions via unspecified vectors.

CVE-2014-4832
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to obtain sensitive cookie information by sniffing the network during an HTTP session.

CVE-2014-4883
Published: 2014-11-27
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?