Vulnerabilities / Threats
2/6/2014
03:42 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

OpenDNS And FireEye Partner To Amplify Protection Against Advanced Cyber Attacks

Company announces integration of its Umbrella security service with the FireEye Web Malware Protection System

LAS VEGAS, Feb. 5, 2014 - OpenDNS, the world's leading provider of cloud security services, today announced the integration of its Umbrella security service with the FireEye Web Malware Protection System (MPS). The combination of OpenDNS predictive threat detection and enforcement with FireEye behavioral analysis provides real-time protection against custom malware, zero-day exploits and advanced persistent threats (APT). Using OpenDNS and FireEye together, customers can extend security policies to the cloud and transparently protect any user and any device, both on and off the network.

OpenDNS will demonstrate its Umbrella security service with FireEye integration at the FireEye 2014 Momentum Partner Conference in Las Vegas this week.

According to Gartner, Inc., "Today's attacks are stealthy and target specific enterprises, individuals and data. A typical targeted attack will exploit multiple weaknesses to achieve its ultimate goal -- usually the theft of data, fraud, or damage to the enterprise."

Today more than ever, employees are working outside of the secured network perimeter, leaving devices vulnerable and increasingly exposed to malicious attacks. As a result, employees bring compromised devices back inside the protected network.

The combination of OpenDNS's cloud security infrastructure and the FireEye allows organizations to block both known and zero-day attacks whether the employee is inside the perimeter or not. Malicious activity detected by FireEye is automatically fed to the Umbrella service to enhance security policy enforcement, protecting customers from infection and preventing data leakage.

"OpenDNS is a pioneer in cloud security," said Didi Dayton, vice president of worldwide strategic alliances at FireEye. "Through this partnership, we are able to extend FireEye's advanced threat protection to the cloud and provide centralized security policy enforcement to any device, on or off the network. OpenDNS offers a unique solution that resonates with our customers and we're excited to welcome them to our partner community."

OpenDNS uses a big data analytics platform that harnesses the collective intelligence of the Internet to discover, predict and block cyber threats without tuning by security administrators. FireEye uses a unique automated approach to test suspicious executable files in a safe virtual environment and analyze their behavior to detect sophisticated malware. To centrally protect all on and off network devices against zero-day and multi-protocol cyber attacks, FireEye will deliver alerts to OpenDNS when new threats are detected.

"This partnership is truly a force-multiplier for Enterprise security," said David Ulevitch, CEO of OpenDNS. "The OpenDNS-FireEye integration provides the most comprehensive protection against cyber attacks and extends enforcement beyond the eroding network perimeter. Together we can detect, alert and block advanced threats before damage can be done."

Availability and Pricing

The Umbrella service with FireEye integration is available immediately from OpenDNS.

Resources:

Our "Secret Sauce"

Managing Evolved Threats

Rethinking Cyber-Security

About OpenDNS

OpenDNS is the world's leading provider of Internet security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. OpenDNS provides millions of businesses, schools and households with a safer, faster and more intelligent Internet experience by protecting them from malicious Web threats and providing them control over how users navigate the Internet, while dramatically increasing the network's overall performance and reliability. The company's cloud-delivered Umbrella security service protects enterprise users from malware, botnets and phishing regardless of location or device. At the heart of all OpenDNS services is the OpenDNS Global Network, the world's largest Internet-wide security network, securing 50 million active users daily through 21 data centers worldwide. For more information, please visit: www.opendns.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.