ThreatTrack Security Introduces Automated APT RemediationThreatTrack Security Introduces Automated APT Remediation
New ThreatSecure platform generates custom remediation signatures for newly discovered malware threats, including APTs, targeted attacks and zero-days
February 22, 2014
Clearwater, Fla. – Feb. 19, 2014 – ThreatTrack Security today announced ThreatSecure, the advanced malware protection platform that provides real-time detection and automated remediation of threats that evade traditional signature-based defenses. The industry's first solution to combine advanced threat detection with closed-loop endpoint remediation, ThreatSecure enables organizations to eliminate Advanced Persistent Threats (APTs), targeted attacks and Zero-day threats by deploying remediation signatures to compromised systems, regardless of what endpoint security solution is in use. Machine learning, signature-less detection accurately determines malicious behavior.
"The security industry's dirty little secret is that it can detect and alert on all kinds of dangerous malware, but it leaves cybersecurity professionals on their own to get rid of them," said ThreatTrack Security President and CEO Julian Waits, Sr. "At a time when the stakes couldn't be higher, this industry has tried to convince users that threat detection is the new threat prevention. That all changes today. ThreatSecure exposes, analyzes and eliminates even the most advanced APTs and targeted attacks – proving it is possible to identify and remediate otherwise unknown threats with the click of a button."
Malware at Heart of Costly Breaches
Organizations of all sizes need a new breed of malware defense to defend against increasingly sophisticated threats and to prevent costly breaches.
Of the data breaches analyzed by the Verizon 2013 Data Breach Investigations Report, 92% were perpetrated by outsiders, 40% incorporated malware, and 66% took months or longer to discover. Moreover, the 2013 Cost of Data Breach Study: Global Analysis by the Ponemon Institute found the average lost business cost topped $3 million for U.S. organizations that experienced a data breach.
Expose, Analyze and Eliminate
ThreatSecure is the culmination of ThreatTrack Security's two decades of experience analyzing malware and developing advanced cybersecurity solutions that remediate infections and defend against emerging threats. The company's powerful cybersecurity technologies serve as the foundation for ThreatSecure. It encompasses sophisticated threat detection technologies, including best-in-class malware analysis, robust anti-malware and endpoint protection, and the company's cloud-based threat intelligence network.
The result is the industry's first real-time detection and closed-loop remediation solution that enables organizations to expose, analyze and eliminate even the most advanced malware.
• Expose Unknown Threats – ThreatSecure provides real-time notification of dangerous malware and integrates with existing alerting and event management systems to quickly initiate action on the most critical threats.
• Analyze Cyber Threats – Through a powerful combination of behavior analysis and machine learning algorithms, ThreatSecure detects malicious content other products can't, without introducing false positives.
• Eliminate Threats with Automated Remediation – Through automated, end-to-end remediation, ThreatSecure not only stops advanced threats, but also eradicates them by generating custom signatures that clean up infected endpoints.
"The time for advanced anti-malware products to stop at sounding the alarm is over, and it is about time," said Adrian Sanabria, Senior Security Analyst at 451 Research. "Remediation is the next logical step – with the detection piece having all the details necessary to remove advanced malware, it is highly inefficient to depend on the security analyst or engineer to perform automated remediation. Companies investing in advanced malware detection have been asking for products that also remove the threats, and this ability will become a requisite feature in this market."
Cutting Through the Noise
In addition to remediating malware threats, ThreatSecure provides an interactive dashboard and views that display cybersecurity data analytics unique to the user's network, enabling easy investigation into patterns, trends and other important security data.
"ThreatSecure provides more actionable threat awareness than any other solution in an enterprise's cyber-defense arsenal," added Waits. "It not only alerts and eliminates threats, but it helps users make sense of all the data it collects so they know how they are being attacked and what they can do right now to stop threats in their tracks."
ThreatSecure is available through ThreatTrack Security's Early Adopter Program, with general availability to follow this spring. The platform – available via the ThreatSecure appliance – will first defend against email-based cyber-attacks, the top threat vector for enterprises, government agencies and organizations of all sizes. ThreatSecure will extend to protect against web- and file-based cyber-attacks later this year.
ThreatTrack Security will introduce ThreatSecure to RSA Conference USA 2014 attendees next week at booth #1901. To learn more about ThreatSecure and the Early Adopter Program, visit http://www.threattracksecurity.com/threatsecure.aspx, call +1 855-885-5566 or send an email to [email protected].
About ThreatTrack Security Inc.
ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by enterprises and government agencies around the world. The company develops advanced cybersecurity solutions that Expose, Analyze and Eliminate the latest malicious threats, including its ThreatSecure advanced threat detection and remediation platform, ThreatAnalyzer malware behavioral analysis sandbox, ThreatIQ real-time threat intelligence service, and VIPRE business antivirus endpoint protection. Learn more at www.ThreatTrackSecurity.com
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
2021 Gartner Market Guide for Managed Detection and Response Report
Supply Chain Cyber Risk Management Whitepaper