Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

11/19/2018
02:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

King & Union and Farsight Security Announce Strategic Partnership

Seamless Integration Allows Security Teams to Improve Collaboration, Automation and Threat Visualization

ALEXANDRIA, Va., Nov. 14, 2018 /PRNewswire/ -- King & Union, the provider of Avalon, a threat analytics platform built with collaboration at its core, today announced a strategic partnership with Farsight Security, Inc., a leading cybersecurity provider of DNS intelligence solutions. King & Union's Avalon platform is now fully integrated with Farsight, allowing Avalon users to access Farsight DNSDB, the world's largest passive DNS database, while also providing Farsight's data consumers with a platform to visualize and collaborate on cyber investigations in real-time.

This new partnership will empower Security Operations Center (SOC) teams - which are traditionally understaffed and overwhelmed by huge volumes of cyber threats - to expose and remediate threats faster and more efficiently.

"Today's threat investigations are timely, costly and very inefficient, with many security analysts and investigators operating in silos, handing things off to each other in an unorganized and ineffective manner," said John Cassidy, CEO and co-founder of King & Union. "Our partnership with Farsight will allow customers to seamlessly apply Farsight's passive DNS data to Avalon's dynamic visualization interface, ultimately facilitating real-time collaboration amongst analysts while also removing repetitive manual workflows and reducing the time to investigate threats."

As a result of the partnership, new Avalon users are now able to concurrently obtain a free 30- day trial to Farsight DNSDB.

"DNS artifacts, from IP addresses to domain names, are the building blocks for phishing, malware and other cyberattacks and often are reused across hundreds of malicious campaigns. Passive DNS enables investigators to illuminate these artifacts and their potential relationships to provide analysts meaningful insights about attacks against their enterprise. We are pleased that our partnership with King & Union will enable Avalon platform users to measurably increase the speed and accuracy of their investigations," said Dr. Paul Vixie, Chairman, CEO and Cofounder of Farsight Security, Inc.

About King & Union

Headquartered in Alexandria, VA and founded in 2016, King & Union is outsmarting cyber adversaries by uniting security professionals and amplifying the power of the cybersecurity analyst. The company's flagship product, Avalon, is a threat analytics platform built with collaboration at its core. Avalon provides a dynamic workspace where security operators and analysts can lean in, cut through the noise and reduce the time to address threats from hours to minutes. The platform provides access to truly unique and exclusive data sources, automating repetitive workflows and leveraging real-time collaboration to deliver unparalleled insight and full context based on facts. Currently, Avalon is in use with several Fortune 500 companies, government agencies, and large MSSPs. For more information, visit: https://www.kingandunion.com/

About Farsight Security, Inc.

Farsight Security, Inc. is the world's largest provider of historical and real-time DNS intelligence solutions. We enable security teams to qualify, enrich and correlate all sources of threat data and ultimately save time when it is most critical - during an attack or investigation. Our solutions provide enterprise, government and security industry personnel and platforms with unmatched global visibility, context and response. Farsight Security is headquartered in San Mateo, California, USA. Learn more about how we can empower your threat platform and security team with Farsight Security passive DNS solutions at https://www.farsightsecurity.com or follow us on Twitter: @FarsightSecInc.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29128
PUBLISHED: 2020-11-26
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
CVE-2020-27251
PUBLISHED: 2020-11-26
A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious port ranges, which could result in remote code execution.
CVE-2020-27253
PUBLISHED: 2020-11-26
A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device.
CVE-2020-27255
PUBLISHED: 2020-11-26
A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the b...
CVE-2020-25651
PUBLISHED: 2020-11-26
A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest...