Vulnerabilities / Threats
2/6/2014
03:42 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

OpenDNS And FireEye Partner To Amplify Protection Against Advanced Cyber Attacks

Company announces integration of its Umbrella security service with the FireEye Web Malware Protection System

LAS VEGAS, Feb. 5, 2014 - OpenDNS, the world's leading provider of cloud security services, today announced the integration of its Umbrella security service with the FireEye Web Malware Protection System (MPS). The combination of OpenDNS predictive threat detection and enforcement with FireEye behavioral analysis provides real-time protection against custom malware, zero-day exploits and advanced persistent threats (APT). Using OpenDNS and FireEye together, customers can extend security policies to the cloud and transparently protect any user and any device, both on and off the network.

OpenDNS will demonstrate its Umbrella security service with FireEye integration at the FireEye 2014 Momentum Partner Conference in Las Vegas this week.

According to Gartner, Inc., "Today's attacks are stealthy and target specific enterprises, individuals and data. A typical targeted attack will exploit multiple weaknesses to achieve its ultimate goal -- usually the theft of data, fraud, or damage to the enterprise."

Today more than ever, employees are working outside of the secured network perimeter, leaving devices vulnerable and increasingly exposed to malicious attacks. As a result, employees bring compromised devices back inside the protected network.

The combination of OpenDNS's cloud security infrastructure and the FireEye allows organizations to block both known and zero-day attacks whether the employee is inside the perimeter or not. Malicious activity detected by FireEye is automatically fed to the Umbrella service to enhance security policy enforcement, protecting customers from infection and preventing data leakage.

"OpenDNS is a pioneer in cloud security," said Didi Dayton, vice president of worldwide strategic alliances at FireEye. "Through this partnership, we are able to extend FireEye's advanced threat protection to the cloud and provide centralized security policy enforcement to any device, on or off the network. OpenDNS offers a unique solution that resonates with our customers and we're excited to welcome them to our partner community."

OpenDNS uses a big data analytics platform that harnesses the collective intelligence of the Internet to discover, predict and block cyber threats without tuning by security administrators. FireEye uses a unique automated approach to test suspicious executable files in a safe virtual environment and analyze their behavior to detect sophisticated malware. To centrally protect all on and off network devices against zero-day and multi-protocol cyber attacks, FireEye will deliver alerts to OpenDNS when new threats are detected.

"This partnership is truly a force-multiplier for Enterprise security," said David Ulevitch, CEO of OpenDNS. "The OpenDNS-FireEye integration provides the most comprehensive protection against cyber attacks and extends enforcement beyond the eroding network perimeter. Together we can detect, alert and block advanced threats before damage can be done."

Availability and Pricing

The Umbrella service with FireEye integration is available immediately from OpenDNS.

Resources:

Our "Secret Sauce"

Managing Evolved Threats

Rethinking Cyber-Security

About OpenDNS

OpenDNS is the world's leading provider of Internet security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. OpenDNS provides millions of businesses, schools and households with a safer, faster and more intelligent Internet experience by protecting them from malicious Web threats and providing them control over how users navigate the Internet, while dramatically increasing the network's overall performance and reliability. The company's cloud-delivered Umbrella security service protects enterprise users from malware, botnets and phishing regardless of location or device. At the heart of all OpenDNS services is the OpenDNS Global Network, the world's largest Internet-wide security network, securing 50 million active users daily through 21 data centers worldwide. For more information, please visit: www.opendns.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web