Cloud
3/18/2013
12:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ThreatTrack Security, Inc. Launches To Compete With FireEye In Advanced Malware Detection

GFI Software spins security business Unit into a separate company

Clearwater, Fla. – March 18, 2013 – ThreatTrack Security Inc. – formerly the Security Business Unit of GFI Software – today launched operations as an independent company dedicated to the analysis, detection and remediation of advanced malware threats. ThreatTrack Security enables organizations to identify and prevent Advanced Persistent Threats (APTs), targeted attacks and sophisticated malware designed to evade the traditional cyber-defenses deployed by enterprises, government agencies, and small and medium-sized businesses (SMBs) around the world.

"It's time for a new approach to malware defense," said Julian Waits, CEO of ThreatTrack Security. "APTs and other complex malware attacks have enterprises – especially those in globally competitive industries like finance, aerospace, healthcare, technology, and oil and gas exploration – struggling to ensure the integrity of their networks and intellectual property. Moreover, many enterprises lack the necessary tools to know with certainty if they are a victim of an APT or other advanced malware strike. ThreatTrack Security was established to help enterprises bolster their cybersecurity readiness right now."

Experience That Counts

ThreatTrack Security is different from the string of recent start-ups proposing untried security solutions and strategies to combat advanced cyber-threats. The company has more than a decade of experience analyzing and remediating malware, developing proven solutions that defend against the escalating sophistication of cybercrime, and it has built a proven track record of satisfying demanding customers on a global scale.

"In the coming months, ThreatTrack Security will unveil a new product roadmap that will augment our existing security solutions and enable us to deliver on our promise of a stronger, more secure enterprise cyber-defense," added Waits.

ThreatTrack Security solutions include:

ThreatAnalyzer&trade (formerly GFI SandBox) is an automated malware analysis sandbox that provides detailed malware behavioral reports to help enterprises defend against APTs, Zero-day threats and targeted attacks by analyzing files and URLs for malicious activity in a controlled, customizable environment. ThreatAnalyzer – increasingly deployed by enterprises nationwide – is used by government security, defense and intelligence agencies, making it an integral component of the U.S. cybersecurity infrastructure.

VIPRE® Business Premium is the company's most robust business antivirus solution that combines antivirus, integrated patch management, Mobile Device Management (MDM) and more to centrally manage and defend PCs, Macs, iPhones, iPads and Android devices. VIPRE Internet Security is the company's premier home antivirus software with anti-spyware and malware protection, automated updates for unpatched software, a firewall to stop malicious web traffic, an anti-spam filter and malicious website blocker. Millions of users worldwide trust VIPRE for their endpoint security.

ThreatIQ&trade provides the real-time malware intelligence that most enterprises lack. The service helps ensure that an enterprise's perimeter security defenses – such as firewalls, IDS/IPS, web filters and anti-spam products – identify and stop threats as they emerge. Customers receive continuous streams of malicious URLs and IP address, suspected files, phishing links and other malware data as it's discovered by ThreatTrack Security Labs.

In addition to a wide array of end-user customers – including large enterprises, government agencies, educational institutions, SMBs and consumers – dozens of OEMs and ISVs partner with ThreatTrack Security to harden their products with integrated malware defenses.

To learn more about ThreatTrack Security, visit www.ThreatTrackSecurity.com, call +1 888-243-4329 or send email to Sales@ThreatTrack.com.

About ThreatTrack Security Inc.

ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware that are designed to evade the traditional cyber-defenses deployed by enterprises, and small and medium-sized businesses (SMBs) around the world. The company develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats, including its ThreatAnalyzer malware behavioral analysis sandbox, VIPRE business and consumer antivirus software, and ThreatIQ real-time threat awareness service. Visit www.ThreatTrackSecurity.com to learn more.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

CVE-2015-0885
Published: 2015-02-27
checkpw 1.02 and earlier allows remote attackers to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.