Vulnerabilities / Threats
2/21/2014
03:36 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ThreatTrack Security Introduces Automated APT Remediation

New ThreatSecure platform generates custom remediation signatures for newly discovered malware threats, including APTs, targeted attacks and zero-days

Clearwater, Fla. – Feb. 19, 2014 – ThreatTrack Security today announced ThreatSecure, the advanced malware protection platform that provides real-time detection and automated remediation of threats that evade traditional signature-based defenses. The industry's first solution to combine advanced threat detection with closed-loop endpoint remediation, ThreatSecure enables organizations to eliminate Advanced Persistent Threats (APTs), targeted attacks and Zero-day threats by deploying remediation signatures to compromised systems, regardless of what endpoint security solution is in use. Machine learning, signature-less detection accurately determines malicious behavior.

"The security industry's dirty little secret is that it can detect and alert on all kinds of dangerous malware, but it leaves cybersecurity professionals on their own to get rid of them," said ThreatTrack Security President and CEO Julian Waits, Sr. "At a time when the stakes couldn't be higher, this industry has tried to convince users that threat detection is the new threat prevention. That all changes today. ThreatSecure exposes, analyzes and eliminates even the most advanced APTs and targeted attacks – proving it is possible to identify and remediate otherwise unknown threats with the click of a button."

Malware at Heart of Costly Breaches

Organizations of all sizes need a new breed of malware defense to defend against increasingly sophisticated threats and to prevent costly breaches.

Of the data breaches analyzed by the Verizon 2013 Data Breach Investigations Report, 92% were perpetrated by outsiders, 40% incorporated malware, and 66% took months or longer to discover. Moreover, the 2013 Cost of Data Breach Study: Global Analysis by the Ponemon Institute found the average lost business cost topped $3 million for U.S. organizations that experienced a data breach.

Expose, Analyze and Eliminate

ThreatSecure is the culmination of ThreatTrack Security's two decades of experience analyzing malware and developing advanced cybersecurity solutions that remediate infections and defend against emerging threats. The company's powerful cybersecurity technologies serve as the foundation for ThreatSecure. It encompasses sophisticated threat detection technologies, including best-in-class malware analysis, robust anti-malware and endpoint protection, and the company's cloud-based threat intelligence network.

The result is the industry's first real-time detection and closed-loop remediation solution that enables organizations to expose, analyze and eliminate even the most advanced malware.

• Expose Unknown Threats – ThreatSecure provides real-time notification of dangerous malware and integrates with existing alerting and event management systems to quickly initiate action on the most critical threats.

• Analyze Cyber Threats – Through a powerful combination of behavior analysis and machine learning algorithms, ThreatSecure detects malicious content other products can't, without introducing false positives.

• Eliminate Threats with Automated Remediation – Through automated, end-to-end remediation, ThreatSecure not only stops advanced threats, but also eradicates them by generating custom signatures that clean up infected endpoints.

"The time for advanced anti-malware products to stop at sounding the alarm is over, and it is about time," said Adrian Sanabria, Senior Security Analyst at 451 Research. "Remediation is the next logical step – with the detection piece having all the details necessary to remove advanced malware, it is highly inefficient to depend on the security analyst or engineer to perform automated remediation. Companies investing in advanced malware detection have been asking for products that also remove the threats, and this ability will become a requisite feature in this market."

Cutting Through the Noise

In addition to remediating malware threats, ThreatSecure provides an interactive dashboard and views that display cybersecurity data analytics unique to the user's network, enabling easy investigation into patterns, trends and other important security data.

"ThreatSecure provides more actionable threat awareness than any other solution in an enterprise's cyber-defense arsenal," added Waits. "It not only alerts and eliminates threats, but it helps users make sense of all the data it collects so they know how they are being attacked and what they can do right now to stop threats in their tracks."

Immediate Availability

ThreatSecure is available through ThreatTrack Security's Early Adopter Program, with general availability to follow this spring. The platform – available via the ThreatSecure appliance – will first defend against email-based cyber-attacks, the top threat vector for enterprises, government agencies and organizations of all sizes. ThreatSecure will extend to protect against web- and file-based cyber-attacks later this year.

ThreatTrack Security will introduce ThreatSecure to RSA Conference USA 2014 attendees next week at booth #1901. To learn more about ThreatSecure and the Early Adopter Program, visit http://www.threattracksecurity.com/threatsecure.aspx, call +1 855-885-5566 or send an email to Sales@ThreatTrack.com.

About ThreatTrack Security Inc.

ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by enterprises and government agencies around the world. The company develops advanced cybersecurity solutions that Expose, Analyze and Eliminate the latest malicious threats, including its ThreatSecure advanced threat detection and remediation platform, ThreatAnalyzer malware behavioral analysis sandbox, ThreatIQ real-time threat intelligence service, and VIPRE business antivirus endpoint protection. Learn more at www.ThreatTrackSecurity.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6477
Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?