Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

3/25/2015
12:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Blue Coat Global Intelligence Network Helps Customers Block, Detect and Respond to Advanced Threats

Unification of Products and Labs Produces Single Stream of Web and Malware Threat Intelligence to Deliver Unprecedented Protection While Reducing the Total Cost of Security

SUNNYVALE, Calif., March 24, 2015Blue Coat Systems, Inc., a market leader in enterprise security, today announced that its cloud-based Global Intelligence Network now integrates Blue Coat’s entire portfolio, including the Norman Shark sandboxing technology and Solera Networks forensics and incident response products recently acquired by Blue Coat. All products now feed and receive threat information on a continuous basis, providing security professionals real-time intelligence that allows them to more effectively blocks threats. This leads to reduced attacks and a more effective Advanced Threat Defense.

The collective intelligence garnered by the Global Intelligence Network allows Blue Coat customers to proactively block threats and reduce samples that lead to false alarms – a reduction of 99.9 percent. This allows them to zero in on, and respond to, the most potentially destructive threats while also reducing costs.

According to recent Ponemon Institute research, “two-thirds of the time spent by security staff responding to malware alerts is wasted because of faulty intelligence. It costs organizations an average of $1.27 million annually in time wasted responding to erroneous or inaccurate malware alerts.” By delivering the highest levels of accuracy to block both known and unknown threats, Blue Coat enables organizations to reduce false security alarms and their associated operational costs.

“With aggressive product development and acquisitions, we have brought together our portfolio in a way that allows each product to be enhanced by the presence of the other products in the portfolio, which is acquisition and R&D nirvana,” said Michael Fey, Blue Coat president and COO. “Blue Coat customers now have the most powerful solution for full network visibility and advanced threat defense in the industry. By helping them see clearly, and protecting them against unknown threats almost instantaneously, our customers gain a level of protection no other single vendor can deliver.”

In addition to product integration, Blue Coat has fortified its threat research capabilities adding researchers with world-class expertise across key areas of information security. Blue Coat Labs combines the company’s WebPulse research, which taps the collective intelligence of more than 15,000 global enterprises, with new expertise and technology from Norman Shark for malware analysis and Solera Networks for security analytics. The result is unparalleled, real-time protection from the rapidly changing threat landscape that has been shown to block more than 99 percent of known and emerging threats. This high degree of accuracy dramatically reduces advanced threat payloads, resulting in lower capacity and capital costs required for malware inspection with sandboxing solutions.

Blue Coat’s unique threat visibility has already fueled research on new threats to protect customers and inform the industry, including Blue Coat Labs’ discovery of The Inception Framework, a highly sophisticated, layered malware attack targeting military, diplomats, and business executives.

About Blue Coat Systems:

Blue Coat empowers enterprises to safely and quickly choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. For additional information, please visit www.bluecoat.com.

 

# # #

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
US Counterintelligence Director & Fmr. Europol Leader Talk Election Security
Kelly Sheridan, Staff Editor, Dark Reading,  10/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4564
PUBLISHED: 2020-10-20
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially lea...
CVE-2020-4748
PUBLISHED: 2020-10-20
IBM Spectrum Scale 5.0.0 through 5.0.5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188517.
CVE-2020-4749
PUBLISHED: 2020-10-20
IBM Spectrum Scale 5.0.0 through 5.0.5.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link ...
CVE-2020-4755
PUBLISHED: 2020-10-20
IBM Spectrum Scale 5.0.0 through 5.0.5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188595.
CVE-2020-4756
PUBLISHED: 2020-10-20
IBM Spectrum Scale V4.2.0.0 through V4.2.3.23 and V5.0.0.0 through V5.0.5.2 as well as IBM Elastic Storage System 6.0.0 through 6.0.1.0 could allow a local attacker to invoke a subset of ioctls on the device with invalid arguments that could crash the keneral and cause a denial of service. IBM X-For...