Analytics
1/29/2013
01:15 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Lastline Announces New On Premise Solution That Detects Today's Rapidly Evolving Malware Threats

Company launches actionable threat intelligence in the privacy of an organization’s personal cloud

SANTA BARBARA, Calif. – January 29, 2013 – Lastline Inc, (www.lastline.com), a leading provider of advanced malware defense solutions announced today their On Premise Advanced Malware Solution that allows organizations to run Lastline's sophisticated analysis and detection engines in the privacy of their own data center. Organizations can now run real-time dynamic analysis of all incoming files (web downloads and email attachments) and monitor outgoing network connections, protecting themselves against advanced malware without the concerns often encountered regarding cloud privacy and security.

"Many network and security administrators have expressed to us their desire to have our highly-scalable solution running within the confines of their own data center," said Jens Andreassen, CEO at Lastline. "This capability gives them unprecedented ability to perform real-time code emulation analysis of programs and documents that enter their network. This enables them to monitor and block suspicious activity with none of their private data leaving their network, as is generally the case with other solutions."

The Lastline Private Infrastructure is unique in that it consists of lightweight sensors placed strategically within the enterprise network and a highly-scalable analysis and management cluster located in the enterprise data center. By implementing a shared analysis resource, or a "private cloud," rather than the traditional "big box" appliance deployment model, enterprises can place as many as several hundred sensors within their network and still retain low cost of ownership. This shared cluster architecture also eliminates any analysis capacity limitations that traditional appliances, running a fixed number of virtual machines, have.

Recently, Lastline introduced their flagship solution, Previct, which provides enterprises with the most comprehensive and in-depth insight into malware infections in their network. This solution complements existing well-known protections and addresses a new class of threat: advanced, targeted attacks that leverage zero-day exploits. Previct analyzes incoming traffic using high-resolution analysis, mines outbound traffic to detect malware-related events, and correlates them into security incidents.

Lastline was founded by a team of computer science professors from the University of California, Santa Barbara and Northeastern University, who are world-renowned researchers in the advanced malware analysis field. The founders of Lastline are also the creators of WEPAWET and ANUBIS; two advanced malware solutions that are among the most widely-used free tools in the industry, with thousands of enterprise, government and security vendor users.

For more information on Lastline and its Previct solution, go to www.lastline.com.

SOCIAL MEDIA:

· Twitter: Www.twitter.com/lastlineinc

· Facebook: https://www.facebook.com/pages/Lastline/450719491632888?ref=hl

About Lastline

Lastline protects networks against targeted attacks, APTs, and 0-day exploits across all threat vectors. Lastline's malware defense solution performs high-resolution analysis of incoming threats and outgoing network traffic, and combines this with active discovery of the threat landscape (malscape). The result is actionable threat intelligence that enables effective remediation.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.