Vulnerabilities / Threats
2/6/2014
03:42 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

OpenDNS And FireEye Partner To Amplify Protection Against Advanced Cyber Attacks

Company announces integration of its Umbrella security service with the FireEye Web Malware Protection System

LAS VEGAS, Feb. 5, 2014 - OpenDNS, the world's leading provider of cloud security services, today announced the integration of its Umbrella security service with the FireEye Web Malware Protection System (MPS). The combination of OpenDNS predictive threat detection and enforcement with FireEye behavioral analysis provides real-time protection against custom malware, zero-day exploits and advanced persistent threats (APT). Using OpenDNS and FireEye together, customers can extend security policies to the cloud and transparently protect any user and any device, both on and off the network.

OpenDNS will demonstrate its Umbrella security service with FireEye integration at the FireEye 2014 Momentum Partner Conference in Las Vegas this week.

According to Gartner, Inc., "Today's attacks are stealthy and target specific enterprises, individuals and data. A typical targeted attack will exploit multiple weaknesses to achieve its ultimate goal -- usually the theft of data, fraud, or damage to the enterprise."

Today more than ever, employees are working outside of the secured network perimeter, leaving devices vulnerable and increasingly exposed to malicious attacks. As a result, employees bring compromised devices back inside the protected network.

The combination of OpenDNS's cloud security infrastructure and the FireEye allows organizations to block both known and zero-day attacks whether the employee is inside the perimeter or not. Malicious activity detected by FireEye is automatically fed to the Umbrella service to enhance security policy enforcement, protecting customers from infection and preventing data leakage.

"OpenDNS is a pioneer in cloud security," said Didi Dayton, vice president of worldwide strategic alliances at FireEye. "Through this partnership, we are able to extend FireEye's advanced threat protection to the cloud and provide centralized security policy enforcement to any device, on or off the network. OpenDNS offers a unique solution that resonates with our customers and we're excited to welcome them to our partner community."

OpenDNS uses a big data analytics platform that harnesses the collective intelligence of the Internet to discover, predict and block cyber threats without tuning by security administrators. FireEye uses a unique automated approach to test suspicious executable files in a safe virtual environment and analyze their behavior to detect sophisticated malware. To centrally protect all on and off network devices against zero-day and multi-protocol cyber attacks, FireEye will deliver alerts to OpenDNS when new threats are detected.

"This partnership is truly a force-multiplier for Enterprise security," said David Ulevitch, CEO of OpenDNS. "The OpenDNS-FireEye integration provides the most comprehensive protection against cyber attacks and extends enforcement beyond the eroding network perimeter. Together we can detect, alert and block advanced threats before damage can be done."

Availability and Pricing

The Umbrella service with FireEye integration is available immediately from OpenDNS.

Resources:

Our "Secret Sauce"

Managing Evolved Threats

Rethinking Cyber-Security

About OpenDNS

OpenDNS is the world's leading provider of Internet security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. OpenDNS provides millions of businesses, schools and households with a safer, faster and more intelligent Internet experience by protecting them from malicious Web threats and providing them control over how users navigate the Internet, while dramatically increasing the network's overall performance and reliability. The company's cloud-delivered Umbrella security service protects enterprise users from malware, botnets and phishing regardless of location or device. At the heart of all OpenDNS services is the OpenDNS Global Network, the world's largest Internet-wide security network, securing 50 million active users daily through 21 data centers worldwide. For more information, please visit: www.opendns.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2188
Published: 2015-02-26
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

CVE-2015-0594
Published: 2015-02-26
Multiple cross-site scripting (XSS) vulnerabilities in the help pages in Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS) and Cisco Security Manager, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq54654 and CSCun1...

CVE-2015-0632
Published: 2015-02-26
Race condition in the Neighbor Discovery (ND) protocol implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service via a flood of Router Solicitation messages on the local network, aka Bug ID CSCuo67770.

CVE-2015-0651
Published: 2015-02-26
Cross-site request forgery (CSRF) vulnerability in the web GUI in Cisco Application Networking Manager (ANM), and Device Manager (DM) on Cisco 4710 Application Control Engine (ACE) appliances, allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuo99753.

CVE-2015-0882
Published: 2015-02-26
Multiple cross-site scripting (XSS) vulnerabilities in zencart-ja (aka Zen Cart Japanese edition) 1.3 jp through 1.3.0.2 jp8 and 1.5 ja through 1.5.1 ja allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to admin/includes/init_includes/init_sanitize.php an...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.