Vulnerabilities / Threats
2/21/2014
03:36 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ThreatTrack Security Introduces Automated APT Remediation

New ThreatSecure platform generates custom remediation signatures for newly discovered malware threats, including APTs, targeted attacks and zero-days

Clearwater, Fla. – Feb. 19, 2014 – ThreatTrack Security today announced ThreatSecure, the advanced malware protection platform that provides real-time detection and automated remediation of threats that evade traditional signature-based defenses. The industry's first solution to combine advanced threat detection with closed-loop endpoint remediation, ThreatSecure enables organizations to eliminate Advanced Persistent Threats (APTs), targeted attacks and Zero-day threats by deploying remediation signatures to compromised systems, regardless of what endpoint security solution is in use. Machine learning, signature-less detection accurately determines malicious behavior.

"The security industry's dirty little secret is that it can detect and alert on all kinds of dangerous malware, but it leaves cybersecurity professionals on their own to get rid of them," said ThreatTrack Security President and CEO Julian Waits, Sr. "At a time when the stakes couldn't be higher, this industry has tried to convince users that threat detection is the new threat prevention. That all changes today. ThreatSecure exposes, analyzes and eliminates even the most advanced APTs and targeted attacks – proving it is possible to identify and remediate otherwise unknown threats with the click of a button."

Malware at Heart of Costly Breaches

Organizations of all sizes need a new breed of malware defense to defend against increasingly sophisticated threats and to prevent costly breaches.

Of the data breaches analyzed by the Verizon 2013 Data Breach Investigations Report, 92% were perpetrated by outsiders, 40% incorporated malware, and 66% took months or longer to discover. Moreover, the 2013 Cost of Data Breach Study: Global Analysis by the Ponemon Institute found the average lost business cost topped $3 million for U.S. organizations that experienced a data breach.

Expose, Analyze and Eliminate

ThreatSecure is the culmination of ThreatTrack Security's two decades of experience analyzing malware and developing advanced cybersecurity solutions that remediate infections and defend against emerging threats. The company's powerful cybersecurity technologies serve as the foundation for ThreatSecure. It encompasses sophisticated threat detection technologies, including best-in-class malware analysis, robust anti-malware and endpoint protection, and the company's cloud-based threat intelligence network.

The result is the industry's first real-time detection and closed-loop remediation solution that enables organizations to expose, analyze and eliminate even the most advanced malware.

• Expose Unknown Threats – ThreatSecure provides real-time notification of dangerous malware and integrates with existing alerting and event management systems to quickly initiate action on the most critical threats.

• Analyze Cyber Threats – Through a powerful combination of behavior analysis and machine learning algorithms, ThreatSecure detects malicious content other products can't, without introducing false positives.

• Eliminate Threats with Automated Remediation – Through automated, end-to-end remediation, ThreatSecure not only stops advanced threats, but also eradicates them by generating custom signatures that clean up infected endpoints.

"The time for advanced anti-malware products to stop at sounding the alarm is over, and it is about time," said Adrian Sanabria, Senior Security Analyst at 451 Research. "Remediation is the next logical step – with the detection piece having all the details necessary to remove advanced malware, it is highly inefficient to depend on the security analyst or engineer to perform automated remediation. Companies investing in advanced malware detection have been asking for products that also remove the threats, and this ability will become a requisite feature in this market."

Cutting Through the Noise

In addition to remediating malware threats, ThreatSecure provides an interactive dashboard and views that display cybersecurity data analytics unique to the user's network, enabling easy investigation into patterns, trends and other important security data.

"ThreatSecure provides more actionable threat awareness than any other solution in an enterprise's cyber-defense arsenal," added Waits. "It not only alerts and eliminates threats, but it helps users make sense of all the data it collects so they know how they are being attacked and what they can do right now to stop threats in their tracks."

Immediate Availability

ThreatSecure is available through ThreatTrack Security's Early Adopter Program, with general availability to follow this spring. The platform – available via the ThreatSecure appliance – will first defend against email-based cyber-attacks, the top threat vector for enterprises, government agencies and organizations of all sizes. ThreatSecure will extend to protect against web- and file-based cyber-attacks later this year.

ThreatTrack Security will introduce ThreatSecure to RSA Conference USA 2014 attendees next week at booth #1901. To learn more about ThreatSecure and the Early Adopter Program, visit http://www.threattracksecurity.com/threatsecure.aspx, call +1 855-885-5566 or send an email to Sales@ThreatTrack.com.

About ThreatTrack Security Inc.

ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by enterprises and government agencies around the world. The company develops advanced cybersecurity solutions that Expose, Analyze and Eliminate the latest malicious threats, including its ThreatSecure advanced threat detection and remediation platform, ThreatAnalyzer malware behavioral analysis sandbox, ThreatIQ real-time threat intelligence service, and VIPRE business antivirus endpoint protection. Learn more at www.ThreatTrackSecurity.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2015-2168
Published: 2015-03-03
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.