Vulnerabilities / Threats
2/6/2014
03:42 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

OpenDNS And FireEye Partner To Amplify Protection Against Advanced Cyber Attacks

Company announces integration of its Umbrella security service with the FireEye Web Malware Protection System

LAS VEGAS, Feb. 5, 2014 - OpenDNS, the world's leading provider of cloud security services, today announced the integration of its Umbrella security service with the FireEye Web Malware Protection System (MPS). The combination of OpenDNS predictive threat detection and enforcement with FireEye behavioral analysis provides real-time protection against custom malware, zero-day exploits and advanced persistent threats (APT). Using OpenDNS and FireEye together, customers can extend security policies to the cloud and transparently protect any user and any device, both on and off the network.

OpenDNS will demonstrate its Umbrella security service with FireEye integration at the FireEye 2014 Momentum Partner Conference in Las Vegas this week.

According to Gartner, Inc., "Today's attacks are stealthy and target specific enterprises, individuals and data. A typical targeted attack will exploit multiple weaknesses to achieve its ultimate goal -- usually the theft of data, fraud, or damage to the enterprise."

Today more than ever, employees are working outside of the secured network perimeter, leaving devices vulnerable and increasingly exposed to malicious attacks. As a result, employees bring compromised devices back inside the protected network.

The combination of OpenDNS's cloud security infrastructure and the FireEye allows organizations to block both known and zero-day attacks whether the employee is inside the perimeter or not. Malicious activity detected by FireEye is automatically fed to the Umbrella service to enhance security policy enforcement, protecting customers from infection and preventing data leakage.

"OpenDNS is a pioneer in cloud security," said Didi Dayton, vice president of worldwide strategic alliances at FireEye. "Through this partnership, we are able to extend FireEye's advanced threat protection to the cloud and provide centralized security policy enforcement to any device, on or off the network. OpenDNS offers a unique solution that resonates with our customers and we're excited to welcome them to our partner community."

OpenDNS uses a big data analytics platform that harnesses the collective intelligence of the Internet to discover, predict and block cyber threats without tuning by security administrators. FireEye uses a unique automated approach to test suspicious executable files in a safe virtual environment and analyze their behavior to detect sophisticated malware. To centrally protect all on and off network devices against zero-day and multi-protocol cyber attacks, FireEye will deliver alerts to OpenDNS when new threats are detected.

"This partnership is truly a force-multiplier for Enterprise security," said David Ulevitch, CEO of OpenDNS. "The OpenDNS-FireEye integration provides the most comprehensive protection against cyber attacks and extends enforcement beyond the eroding network perimeter. Together we can detect, alert and block advanced threats before damage can be done."

Availability and Pricing

The Umbrella service with FireEye integration is available immediately from OpenDNS.

Resources:

Our "Secret Sauce"

Managing Evolved Threats

Rethinking Cyber-Security

About OpenDNS

OpenDNS is the world's leading provider of Internet security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. OpenDNS provides millions of businesses, schools and households with a safer, faster and more intelligent Internet experience by protecting them from malicious Web threats and providing them control over how users navigate the Internet, while dramatically increasing the network's overall performance and reliability. The company's cloud-delivered Umbrella security service protects enterprise users from malware, botnets and phishing regardless of location or device. At the heart of all OpenDNS services is the OpenDNS Global Network, the world's largest Internet-wide security network, securing 50 million active users daily through 21 data centers worldwide. For more information, please visit: www.opendns.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2413
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.

CVE-2012-5244
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Banana Dance B.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) return, (2) display, (3) table, or (4) search parameter to functions/suggest.php; (5) the id parameter to functions/widgets.php, (6) the category parameter to...

CVE-2012-5694
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allow remote attackers to execute arbitrary SQL commands via the (1) agentPhNo, (2) controlPhNo, (3) agentURLPath, (4) agentControlKey, or (5) platformDD1 parameter to frameworkgui/attach2Agents.p...

CVE-2012-5695
Published: 2014-10-20
Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS m...

CVE-2012-5696
Published: 2014-10-20
Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 does not properly restrict access to frameworkgui/config, which allows remote attackers to obtain the plaintext database password via a direct request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.