Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

01:57 PM
Dark Reading
Dark Reading
Products and Releases

NetWitness Launches Online Intelligence Service

NetWitness Live is a 24/7 data feed that provides organizations the real-time ability to navigate network threat intelligence from multiple, globally distributed threat intelligence sources

Herndon, VA " March 23, 2009 " NetWitness Corporation, the leading provider of next generation network monitoring and threat analysis solutions, today announced the launch of NetWitness Live, a 24x7 data feed that empowers customers to immediately leverage real-time threat-intelligence and reputational content using their NetWitness infrastructure. This new service provides radar-like visibility into threats being discovered elsewhere on the Internet, and allows customers to easily identify, prioritize and remediate their responses.

For the first time, NetWitness Live provides public and private organizations the real-time ability to navigate the full content of network threat intelligence from multiple, globally-distributed threat intelligence sources. Unlike other services which focus on single source intelligence, NetWitness Live enables users to tailor their data feeds according to their environment and threat profile.

"By delivering a single solution that aggregates data from multiple globally distributed and disparate sources, NetWitness is able to provide its customers the reliable intelligence necessary to proactively identify and address threats to their enterprise," said Eddie Schwartz, Chief Security Officer for NetWitness. "With years of experience in the government, intelligence community, financial markets and other high threat profile environments, we understand the risks our customers face when trying to address dynamic threats without a broad, proactive intelligence base or using manual techniques. NetWitness Live enables personalized real-time threat intelligence, strengthening our customers' ability to stay ahead of attacks. "

NetWitness Live provides features designed to simplify threat intelligence, including:

Proactively optimizing and automating insight into advanced threats Reducing time to identify, assess and respond to incidents, improve staff efficiency and time to incident closure Real-time, reliable and credible multi-source threat intelligence Definitively classifying computers associated with illegal third party exploits, open proxies, worms/viruses, spam engines, compromised internal systems, Botnets and other current and zero-day exploits Identifying network traffic associated with computers on the Specially Designated Nationals List (SDN) Synchronizing with content derived from broad and best of breed data sources

NetWitness has partnered with multiple data providers from the open-source, research and the commercial communities to provide the most comprehensive threat intelligence available. These sources include: SANs Internet Storm Center, SRI Malware Threat Center, ShadowServer, U.S. Department of Treasury, MyNetWatchman and others. Additional threat feeds will be incorporated on a regular and ongoing basis.

For more information on NetWitness Live or to download the freeware version of NetWitness Investigator that includes NetWitness Live, visit: www.netwitness.com.

About NetWitness NetWitness' Corporation provides patented next generation network security monitoring software products. Users of NetWitness NextGen can concurrently solve a wide variety of information security problems including: advanced persistent threat management, data leakage protection, malware activity detection, insider threat detection, GRC controls verification and network-based e-discovery. Originally, developed for the US Intelligence Community, NetWitness has evolved to provide enterprises with breakthrough methods of network content analysis and risk verification and determination. Customers include Defense, National Law Enforcement and Intelligence Agencies, Top 10 U.S. Banks, Critical Infrastructure, and Fortune 1000 organizations. To download the freeware version of NetWitness Investigator, visit http://download.netwitness.com. For more information about securing your entire organization with NetWitness NextGen, contact: [email protected]

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...