08:17 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Norse Expands Threat Intelligence To Include Detection Of Malware In Development And Identification Of Devices

Norse IPViking 2.0 has can identify mobile and desktop devices, appliances, servers, and even satellites in space attempting to connect to networks via malicious IP addresses

SAN MATEO, Calif., Dec. 12, 2013 /PRNewswire/ -- Norse, a leading provider of live threat intelligence solutions, today announced availability of Norse IPViking&trade 2.0, the next generation of its cloud-based IT security solution, which provides context-rich, dark-threat intelligence about the darkest segments of the Internet. New to IPViking are unique threat intelligence capabilities that detect malware while it is in the development phase, before cybercriminals can use it as part of an attack. Norse has also added capabilities that identify mobile and desktop devices, appliances, servers and even satellites in space attempting to connect to networks via malicious IP addresses. Pre-attack malware detection and malicious-device-type identification capabilities allow customers to reduce their risk of falling victim to costly compliance violations, compromises and data breaches. Norse's fully automated threat intelligence capabilities improve threat identification and detection accuracy and eliminate delays caused by manual processes.

(Logo: http://photos.prnewswire.com/prnh/20131212/AQ32329LOGO)

Tweet This: Detecting #malware ahead of release, @NorseCorp #IPViking2.0 provides live threat intelligence from the #darkside of the Internet http://norse-corp.com/ipviking.html#prod

"The threat landscape evolves faster than most IT security solutions can keep pace with. Intelligence and visibility into what is taking place in the darkest corners of the Internet is an essential component of any effective security strategy," said Richard Stiennon, noted cybersecurity expert, author and IT-Harvest analyst. "As a start-up, Norse is providing innovative and effective threat intelligence solutions that allow their customers to strengthen their defenses against the most advanced threats."

Pre-Attack Malware Intelligence

Malware is an insidious problem for all connected enterprises, government agencies and consumers. With the emergence of the Internet of Things (IoT), where virtually all electronic devices, from consumer appliances to industrial systems, are connected to the Internet via an IP address, cybercriminals and nation-backed operators are finding it easier to execute advanced attacks. Malware, used to infect computers to siphon data, engage in cyber espionage and even inflict physical damage, is at the forefront of most attacks. Pre-attack detection capabilities added to IPViking allow customers to detect and take action to defend against malware while it is in the development, Zero Day or identified (signature) phase.

Device and Operating System Threat Intelligence

IPViking customers have benefited from the solution's ability to detect malicious IP-based attacks before they develop into compromises and data breaches. IPViking 2.0 adds device type and OS identification, providing more context to Norse's already detailed threat intelligence. IPViking now identifies devices such as desktops, iPads or other mobile devices as well as servers and appliances on IPs conducting high-risk activity. To provide customers with more threat-intelligence context and enable them to make better decisions, IPViking also classifies the high-risk devices it identifies into categories such as government, consumer, education and corporate.

"The Internet is the most widely used business communications and transaction platform and at the same time, the most dangerous. There is no real way to remain protected against attacks and exploits without visibility into what the bad actors are doing and planning," said Sam Glines, CEO, Norse. "IPViking 2.0 delivers the most comprehensive threat intelligence available today and true early warning that enables enterprises and government agencies to detect threats and take action before they inflict financial and reputation damage."

For more information on IPViking 2.0, visit: LINK

Follow Norse on Twitter: @NorseCorp

Like Norse on Facebook: https://www.facebook.com/NorseCorporation

Follow Norse on LinkedIn: http://www.linkedin.com/company/norse-corporation

Subscribe to Norse YouTube Channel: http://www.youtube.com/user/norsecorporation

Add Norse to G+ Circles: https://plus.google.com/+Norse-corp/posts

About Norse

Norse is the leading innovator in the live threat intelligence security market. With the goal of transforming the traditionally reactive IT security industry, Norse offers proactive, intelligence-based security solutions that enable organizations to identify and defend against the advanced cyberthreats of today and tomorrow. Norse's synchronous, global platform is a patent-pending infrastructure-based technology that continuously collects and analyzes real-time, high-risk Internet traffic to identify the sources of cyberattacks and fraud. Norse is the only provider of live, actionable, cyberthreat intelligence that enables organizations to prevent financial fraud and proactively defend against today's most advanced cyber threats including zero day and advanced persistent threats. Norse has offices in Silicon Valley, St. Louis, and Atlanta. Visit us online at norse-corp.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web