Cloud
3/18/2013
12:29 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

ThreatTrack Security, Inc. Launches To Compete With FireEye In Advanced Malware Detection

GFI Software spins security business Unit into a separate company

Clearwater, Fla. – March 18, 2013 – ThreatTrack Security Inc. – formerly the Security Business Unit of GFI Software – today launched operations as an independent company dedicated to the analysis, detection and remediation of advanced malware threats. ThreatTrack Security enables organizations to identify and prevent Advanced Persistent Threats (APTs), targeted attacks and sophisticated malware designed to evade the traditional cyber-defenses deployed by enterprises, government agencies, and small and medium-sized businesses (SMBs) around the world.

"It's time for a new approach to malware defense," said Julian Waits, CEO of ThreatTrack Security. "APTs and other complex malware attacks have enterprises – especially those in globally competitive industries like finance, aerospace, healthcare, technology, and oil and gas exploration – struggling to ensure the integrity of their networks and intellectual property. Moreover, many enterprises lack the necessary tools to know with certainty if they are a victim of an APT or other advanced malware strike. ThreatTrack Security was established to help enterprises bolster their cybersecurity readiness right now."

Experience That Counts

ThreatTrack Security is different from the string of recent start-ups proposing untried security solutions and strategies to combat advanced cyber-threats. The company has more than a decade of experience analyzing and remediating malware, developing proven solutions that defend against the escalating sophistication of cybercrime, and it has built a proven track record of satisfying demanding customers on a global scale.

"In the coming months, ThreatTrack Security will unveil a new product roadmap that will augment our existing security solutions and enable us to deliver on our promise of a stronger, more secure enterprise cyber-defense," added Waits.

ThreatTrack Security solutions include:

ThreatAnalyzer&trade (formerly GFI SandBox) is an automated malware analysis sandbox that provides detailed malware behavioral reports to help enterprises defend against APTs, Zero-day threats and targeted attacks by analyzing files and URLs for malicious activity in a controlled, customizable environment. ThreatAnalyzer – increasingly deployed by enterprises nationwide – is used by government security, defense and intelligence agencies, making it an integral component of the U.S. cybersecurity infrastructure.

VIPRE® Business Premium is the company's most robust business antivirus solution that combines antivirus, integrated patch management, Mobile Device Management (MDM) and more to centrally manage and defend PCs, Macs, iPhones, iPads and Android devices. VIPRE Internet Security is the company's premier home antivirus software with anti-spyware and malware protection, automated updates for unpatched software, a firewall to stop malicious web traffic, an anti-spam filter and malicious website blocker. Millions of users worldwide trust VIPRE for their endpoint security.

ThreatIQ&trade provides the real-time malware intelligence that most enterprises lack. The service helps ensure that an enterprise's perimeter security defenses – such as firewalls, IDS/IPS, web filters and anti-spam products – identify and stop threats as they emerge. Customers receive continuous streams of malicious URLs and IP address, suspected files, phishing links and other malware data as it's discovered by ThreatTrack Security Labs.

In addition to a wide array of end-user customers – including large enterprises, government agencies, educational institutions, SMBs and consumers – dozens of OEMs and ISVs partner with ThreatTrack Security to harden their products with integrated malware defenses.

To learn more about ThreatTrack Security, visit www.ThreatTrackSecurity.com, call +1 888-243-4329 or send email to Sales@ThreatTrack.com.

About ThreatTrack Security Inc.

ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware that are designed to evade the traditional cyber-defenses deployed by enterprises, and small and medium-sized businesses (SMBs) around the world. The company develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats, including its ThreatAnalyzer malware behavioral analysis sandbox, VIPRE business and consumer antivirus software, and ThreatIQ real-time threat awareness service. Visit www.ThreatTrackSecurity.com to learn more.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio