Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

11/19/2018
02:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

King & Union and Farsight Security Announce Strategic Partnership

Seamless Integration Allows Security Teams to Improve Collaboration, Automation and Threat Visualization

ALEXANDRIA, Va., Nov. 14, 2018 /PRNewswire/ -- King & Union, the provider of Avalon, a threat analytics platform built with collaboration at its core, today announced a strategic partnership with Farsight Security, Inc., a leading cybersecurity provider of DNS intelligence solutions. King & Union's Avalon platform is now fully integrated with Farsight, allowing Avalon users to access Farsight DNSDB, the world's largest passive DNS database, while also providing Farsight's data consumers with a platform to visualize and collaborate on cyber investigations in real-time.

This new partnership will empower Security Operations Center (SOC) teams - which are traditionally understaffed and overwhelmed by huge volumes of cyber threats - to expose and remediate threats faster and more efficiently.

"Today's threat investigations are timely, costly and very inefficient, with many security analysts and investigators operating in silos, handing things off to each other in an unorganized and ineffective manner," said John Cassidy, CEO and co-founder of King & Union. "Our partnership with Farsight will allow customers to seamlessly apply Farsight's passive DNS data to Avalon's dynamic visualization interface, ultimately facilitating real-time collaboration amongst analysts while also removing repetitive manual workflows and reducing the time to investigate threats."

As a result of the partnership, new Avalon users are now able to concurrently obtain a free 30- day trial to Farsight DNSDB.

"DNS artifacts, from IP addresses to domain names, are the building blocks for phishing, malware and other cyberattacks and often are reused across hundreds of malicious campaigns. Passive DNS enables investigators to illuminate these artifacts and their potential relationships to provide analysts meaningful insights about attacks against their enterprise. We are pleased that our partnership with King & Union will enable Avalon platform users to measurably increase the speed and accuracy of their investigations," said Dr. Paul Vixie, Chairman, CEO and Cofounder of Farsight Security, Inc.

About King & Union

Headquartered in Alexandria, VA and founded in 2016, King & Union is outsmarting cyber adversaries by uniting security professionals and amplifying the power of the cybersecurity analyst. The company's flagship product, Avalon, is a threat analytics platform built with collaboration at its core. Avalon provides a dynamic workspace where security operators and analysts can lean in, cut through the noise and reduce the time to address threats from hours to minutes. The platform provides access to truly unique and exclusive data sources, automating repetitive workflows and leveraging real-time collaboration to deliver unparalleled insight and full context based on facts. Currently, Avalon is in use with several Fortune 500 companies, government agencies, and large MSSPs. For more information, visit: https://www.kingandunion.com/

About Farsight Security, Inc.

Farsight Security, Inc. is the world's largest provider of historical and real-time DNS intelligence solutions. We enable security teams to qualify, enrich and correlate all sources of threat data and ultimately save time when it is most critical - during an attack or investigation. Our solutions provide enterprise, government and security industry personnel and platforms with unmatched global visibility, context and response. Farsight Security is headquartered in San Mateo, California, USA. Learn more about how we can empower your threat platform and security team with Farsight Security passive DNS solutions at https://www.farsightsecurity.com or follow us on Twitter: @FarsightSecInc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35477
PUBLISHED: 2021-08-02
In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled valu...
CVE-2017-18113
PUBLISHED: 2021-08-02
The DefaultOSWorkflowConfigurator class in Jira Server and Jira Data Center before version 8.18.1 allows remote attackers who can trick a system administrator to import their malicious workflow to execute arbitrary code via a Remote Code Execution (RCE) vulnerability. The vulnerability allowed for v...
CVE-2021-32066
PUBLISHED: 2021-08-01
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the c...
CVE-2021-37759
PUBLISHED: 2021-07-31
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2021-37760
PUBLISHED: 2021-07-31
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).