Analytics

11/19/2018
02:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

King & Union and Farsight Security Announce Strategic Partnership

Seamless Integration Allows Security Teams to Improve Collaboration, Automation and Threat Visualization

ALEXANDRIA, Va., Nov. 14, 2018 /PRNewswire/ -- King & Union, the provider of Avalon, a threat analytics platform built with collaboration at its core, today announced a strategic partnership with Farsight Security, Inc., a leading cybersecurity provider of DNS intelligence solutions. King & Union's Avalon platform is now fully integrated with Farsight, allowing Avalon users to access Farsight DNSDB, the world's largest passive DNS database, while also providing Farsight's data consumers with a platform to visualize and collaborate on cyber investigations in real-time.

This new partnership will empower Security Operations Center (SOC) teams - which are traditionally understaffed and overwhelmed by huge volumes of cyber threats - to expose and remediate threats faster and more efficiently.

"Today's threat investigations are timely, costly and very inefficient, with many security analysts and investigators operating in silos, handing things off to each other in an unorganized and ineffective manner," said John Cassidy, CEO and co-founder of King & Union. "Our partnership with Farsight will allow customers to seamlessly apply Farsight's passive DNS data to Avalon's dynamic visualization interface, ultimately facilitating real-time collaboration amongst analysts while also removing repetitive manual workflows and reducing the time to investigate threats."

As a result of the partnership, new Avalon users are now able to concurrently obtain a free 30- day trial to Farsight DNSDB.

"DNS artifacts, from IP addresses to domain names, are the building blocks for phishing, malware and other cyberattacks and often are reused across hundreds of malicious campaigns. Passive DNS enables investigators to illuminate these artifacts and their potential relationships to provide analysts meaningful insights about attacks against their enterprise. We are pleased that our partnership with King & Union will enable Avalon platform users to measurably increase the speed and accuracy of their investigations," said Dr. Paul Vixie, Chairman, CEO and Cofounder of Farsight Security, Inc.

About King & Union

Headquartered in Alexandria, VA and founded in 2016, King & Union is outsmarting cyber adversaries by uniting security professionals and amplifying the power of the cybersecurity analyst. The company's flagship product, Avalon, is a threat analytics platform built with collaboration at its core. Avalon provides a dynamic workspace where security operators and analysts can lean in, cut through the noise and reduce the time to address threats from hours to minutes. The platform provides access to truly unique and exclusive data sources, automating repetitive workflows and leveraging real-time collaboration to deliver unparalleled insight and full context based on facts. Currently, Avalon is in use with several Fortune 500 companies, government agencies, and large MSSPs. For more information, visit: https://www.kingandunion.com/

About Farsight Security, Inc.

Farsight Security, Inc. is the world's largest provider of historical and real-time DNS intelligence solutions. We enable security teams to qualify, enrich and correlate all sources of threat data and ultimately save time when it is most critical - during an attack or investigation. Our solutions provide enterprise, government and security industry personnel and platforms with unmatched global visibility, context and response. Farsight Security is headquartered in San Mateo, California, USA. Learn more about how we can empower your threat platform and security team with Farsight Security passive DNS solutions at https://www.farsightsecurity.com or follow us on Twitter: @FarsightSecInc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7213
PUBLISHED: 2019-04-24
SmarterTools SmarterMail 16.x before build 6985 allows directory traversal. An authenticated user could delete arbitrary files or could create files in new folders in arbitrary locations on the mail server. This could lead to command execution on the server for instance by putting files inside the w...
CVE-2019-7214
PUBLISHED: 2019-04-24
SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrusted data. An unauthenticated attacker could run commands on the server when port 17001 was remotely accessible. This port is not accessible remotely by default after applying the Build 6985 patch.
CVE-2019-9734
PUBLISHED: 2019-04-24
aquaverde Aquarius CMS through 4.3.5 writes POST and GET parameters (including passwords) to a log file because of incorrect if/else usage in the Log-File writer component.
CVE-2019-9928
PUBLISHED: 2019-04-24
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
CVE-2019-7211
PUBLISHED: 2019-04-24
SmarterTools SmarterMail 16.x before build 6995 has stored XSS. JavaScript code could be executed on the application by opening a malicious email or when viewing a malicious file attachment.