08:17 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Norse Expands Threat Intelligence To Include Detection Of Malware In Development And Identification Of Devices

Norse IPViking 2.0 has can identify mobile and desktop devices, appliances, servers, and even satellites in space attempting to connect to networks via malicious IP addresses

SAN MATEO, Calif., Dec. 12, 2013 /PRNewswire/ -- Norse, a leading provider of live threat intelligence solutions, today announced availability of Norse IPViking&trade 2.0, the next generation of its cloud-based IT security solution, which provides context-rich, dark-threat intelligence about the darkest segments of the Internet. New to IPViking are unique threat intelligence capabilities that detect malware while it is in the development phase, before cybercriminals can use it as part of an attack. Norse has also added capabilities that identify mobile and desktop devices, appliances, servers and even satellites in space attempting to connect to networks via malicious IP addresses. Pre-attack malware detection and malicious-device-type identification capabilities allow customers to reduce their risk of falling victim to costly compliance violations, compromises and data breaches. Norse's fully automated threat intelligence capabilities improve threat identification and detection accuracy and eliminate delays caused by manual processes.

(Logo: http://photos.prnewswire.com/prnh/20131212/AQ32329LOGO)

Tweet This: Detecting #malware ahead of release, @NorseCorp #IPViking2.0 provides live threat intelligence from the #darkside of the Internet http://norse-corp.com/ipviking.html#prod

"The threat landscape evolves faster than most IT security solutions can keep pace with. Intelligence and visibility into what is taking place in the darkest corners of the Internet is an essential component of any effective security strategy," said Richard Stiennon, noted cybersecurity expert, author and IT-Harvest analyst. "As a start-up, Norse is providing innovative and effective threat intelligence solutions that allow their customers to strengthen their defenses against the most advanced threats."

Pre-Attack Malware Intelligence

Malware is an insidious problem for all connected enterprises, government agencies and consumers. With the emergence of the Internet of Things (IoT), where virtually all electronic devices, from consumer appliances to industrial systems, are connected to the Internet via an IP address, cybercriminals and nation-backed operators are finding it easier to execute advanced attacks. Malware, used to infect computers to siphon data, engage in cyber espionage and even inflict physical damage, is at the forefront of most attacks. Pre-attack detection capabilities added to IPViking allow customers to detect and take action to defend against malware while it is in the development, Zero Day or identified (signature) phase.

Device and Operating System Threat Intelligence

IPViking customers have benefited from the solution's ability to detect malicious IP-based attacks before they develop into compromises and data breaches. IPViking 2.0 adds device type and OS identification, providing more context to Norse's already detailed threat intelligence. IPViking now identifies devices such as desktops, iPads or other mobile devices as well as servers and appliances on IPs conducting high-risk activity. To provide customers with more threat-intelligence context and enable them to make better decisions, IPViking also classifies the high-risk devices it identifies into categories such as government, consumer, education and corporate.

"The Internet is the most widely used business communications and transaction platform and at the same time, the most dangerous. There is no real way to remain protected against attacks and exploits without visibility into what the bad actors are doing and planning," said Sam Glines, CEO, Norse. "IPViking 2.0 delivers the most comprehensive threat intelligence available today and true early warning that enables enterprises and government agencies to detect threats and take action before they inflict financial and reputation damage."

For more information on IPViking 2.0, visit: LINK

Follow Norse on Twitter: @NorseCorp

Like Norse on Facebook: https://www.facebook.com/NorseCorporation

Follow Norse on LinkedIn: http://www.linkedin.com/company/norse-corporation

Subscribe to Norse YouTube Channel: http://www.youtube.com/user/norsecorporation

Add Norse to G+ Circles: https://plus.google.com/+Norse-corp/posts

About Norse

Norse is the leading innovator in the live threat intelligence security market. With the goal of transforming the traditionally reactive IT security industry, Norse offers proactive, intelligence-based security solutions that enable organizations to identify and defend against the advanced cyberthreats of today and tomorrow. Norse's synchronous, global platform is a patent-pending infrastructure-based technology that continuously collects and analyzes real-time, high-risk Internet traffic to identify the sources of cyberattacks and fraud. Norse is the only provider of live, actionable, cyberthreat intelligence that enables organizations to prevent financial fraud and proactively defend against today's most advanced cyber threats including zero day and advanced persistent threats. Norse has offices in Silicon Valley, St. Louis, and Atlanta. Visit us online at norse-corp.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web