Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

04:00 PM
Dark Reading
Dark Reading
Products and Releases

Lastline Partners with Bit9 + Carbon Black to Deliver Comprehensive Network and Endpoint Breach Protection

Product Integration Provides End-to-End Coverage Against Advanced and Evasive Malware

REDWOOD CITY, Calif., Feb. 3, 2015 – Lastline, a global breach detection platform provider, today announced a partnership and technology integration with Bit9 + Carbon Black, the leader in endpoint threat prevention, detection and response. The integration delivers automated and comprehensive end-to-end endpoint and network security for email, web, files and mobile applications. Lastline also has joined the “Bit9 + Carbon Black Connect” Alliance Partner Program.

“Defenders are increasingly being overrun both by ordinary cybercrime (or hacktivist attacks) and by advanced, targeted attacks from sophisticated adversaries,” said Mario de Boer of Gartner. “A complete advanced anti-malware strategy must consider extending the traditional endpoint and Web/email protections with network malware protection systems (MPSs) and the latest technologies in endpoint protection, in addition to malware incident response.” 1

With faster and more comprehensive visibility into indicators of compromise and malware behaviors on endpoints such as laptops or desktops, IT security professionals are far better equipped to identify and respond to advanced threats with Lastline and Bit9 + Carbon Black in place.

“Our shared commitment to interoperable platforms that support rapid response to enterprise security threats with end-to-end endpoint and network security makes this partnership with Bit9 + Carbon Black a natural fit,” said Brian Laing, VP of Products for Lastline. “Undersecured endpoints are a primary source of enterprise data leakage, which makes the Lastline Breach Detection Platform, and the ability to correlate malware detection and response across endpoints and the network, a powerful complement to best-of-breed endpoint security solutions such as Bit9 + Carbon Black.”

The software-based Lastline Breach Detection Platform allows integration partners to tap into advanced malware protection for email, file, Web content and mobile applications. Lastline’s full-system emulation sandbox detects advanced threats including evasive malware that is crafted to bypass traditional sandboxes.

“It is well understood that attacks and compromise are the new normal, and legacy security systems do not solve the problem of today’s advanced threats. Integrating the Carbon Black open platform and Lastline’s Breach Detection Platform extends real-time advanced threat prevention, detection, analysis and response to every endpoint and server in an enterprise,” said Tom Barsi, vice president of business development for Bit9 + Carbon Black.

To learn more:


1Gartner, Next Steps in Endpoint Malware Protection, Mario de Boer, July 7, 2014

About Lastline

Lastline is innovating the way companies detect active breaches caused by advanced persistent threats, targeted attacks and evasive malware with its software-based Breach Detection Platform. Lastline’s open architecture integrates advanced threat defenses and intelligence into existing operational workflows and security systems. Inspection of suspicious objects occurs at scale in real-time using a full-system emulation approach to sandboxing that is superior to virtual machine-based and OS emulation techniques. Lastline's technology correlates network and object analysis to achieve timely breach confirmation and incident response. Lastline was built by Anubis and Wepawet researchers and industry veterans with decades of experience focused specifically on advanced breach weaponry and tactics. Headquartered in Redwood City, California with offices throughout North America, Europe and Asia, Lastline’s platform is used by global managed security service providers, Global 2000 enterprises and leading security vendors worldwide. To learn more, visit www.lastline.com.



Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...
PUBLISHED: 2020-12-02
HCL Domino is susceptible to a Buffer Overflow vulnerability in DXL due to improper validation of user input. A successful exploit could enable an attacker to crash Domino or execute attacker-controlled code on the server system.
PUBLISHED: 2020-12-02
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat ...