Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:15 PM
Dark Reading
Dark Reading
Products and Releases

Lastline Debuts New Product to Protect Enterprise from Advanced Malware

Lastline Detonator leverages existing deployments, such as Tripwire and Bit9 + Carbon Black, to make advanced malware protection as easy as "flipping a switch."

October 20, 2015 11:00 AM Eastern Daylight Time

REDWOOD CITY, Calif. -- Advanced malware protection provider Lastline today announced Lastline Detonator, a new solution to protect the full enterprise — including mobile, remote and SoHo users — from sophisticated malware and targeted attacks. Lastline Detonator analyzes potentially malicious files gathered from popular existing endpoint agents and network devices, enabling IT professionals to extend advanced protection to the entire organization easily, economically and within minutes.

“By leveraging the existing agents thousands of Tripwire customers have already deployed, Lastline Detonator can be quickly and easily deployed throughout an enterprise environment.”

“While many organizations have purchased advanced malware protection, few have successfully deployed it enterprise wide,” noted Jens Andreassen, CEO of Lastline, Inc. “Lastline Detonator offers the industry’s fastest, most cost-effective solution to protect the entire organization against today’s sophisticated malware attacks.”

Lastline Detonator does not require the customer to deploy network probes throughout their enterprise. Rather, it uses existing deployments of popular endpoint agents, such as Bit9 + Carbon Black and Tripwire, and network devices, such as Barracuda and Watchguard, to collect questionable files. Lastline Detonator analyzes these objects using Full System Emulation (FUSE™) to detect malicious behavior. Once it identifies malware, Lastline Detonator automatically deploys mitigation measures to endpoints and network devices and delivers comprehensive reporting to the incident response organization.

By using existing deployments of agents, Lastline Detonator offers the fastest and most cost-effective means to deploy advanced malware protection for an organization. Implementation can be completed in minutes by simply setting a few configuration parameters. Further, protection is automatically extended to small offices and mobile users, audiences that have traditionally been difficult to protect.

Lastline Detonator protects against sophisticated zero-day and targeted attacks that often thwart competing solutions. Modern malware creators are well aware of anti-malware technology and use sophisticated techniques to evade identification. Lastline’s FUSE technology emulates the full computer system (not just the OS) to detect these evasive behaviors and identify malware other solutions would miss.

"Connecting Lastline Detonator's advanced malware sandboxing technology with Tripwire Enterprise's deep system integrity monitoring capabilities provides a comprehensive solution for detecting evasive, highly weaponized malware that traditional solutions miss and that today's sophisticated attackers are regularly using,” said David Meltzer, chief research officer for Tripwire. “By leveraging the existing agents thousands of Tripwire customers have already deployed, Lastline Detonator can be quickly and easily deployed throughout an enterprise environment.”

Lastline Detonator will be available in October 2015 directly through Lastline and authorized resellers.

About Lastline

Lastline is innovating the way companies detect active breaches caused by advanced persistent threats, targeted attacks and evasive malware. Lastline’s open architecture integrates advanced threat defenses and intelligence into existing operational workflows and security systems. Inspection of suspicious objects occurs at scale in real-time using a full-system emulation approach to sandboxing that is superior to virtual machine-based and OS emulation techniques. Lastline's technology correlates network and object analysis to achieve timely breach confirmation and incident response. Lastline was built by Anubis and Wepawet researchers and industry veterans with decades of experience focused specifically on advanced breach weaponry and tactics.

Headquartered in Redwood City, California with offices throughout North America, Europe and Asia, Lastline’s platform is used by global managed security service providers, Global 2000 enterprises and leading security vendors worldwide. To learn more, visit www.lastline.com

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-20
Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vul...
PUBLISHED: 2021-01-20
A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. T...
PUBLISHED: 2021-01-20
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query,...
PUBLISHED: 2021-01-20
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSS...
PUBLISHED: 2021-01-20
Employee Performance Evaluation System in PHP/MySQLi with Source Code 1.0 is affected by cross-site scripting (XSS) in the Employees, First Name and Last Name fields.