Triumfant Issues RSA 2010 Malware Detection Challenge

Company aims to show how its Resolution Manager solution can detect, analyze and remove all remnants of any malware infection

February 22, 2010

2 Min Read


ROCKVILLE, Md., Feb. 22 /PRNewswire/ -- Triumfant, creator of patented software that automatically discovers, analyzes and remediates unexpected changes and conditions at the endpoint, invites all RSA Conference attendees to participate in its Malware Detection Challenge: "You Bring It; We Find It". To demonstrate the power of its Resolution Manager and its ability to identify and eliminate malware without signatures or prior knowledge of the code, Triumfant challenges attendees to load malware onto a USB storage device and bring it to the Triumfant booth (#756) where it will be placed onto a computer equipped with Triumfant's Resolution Manager.

Triumfant will show how its unique Resolution Manager solution can detect, analyze and remove all remnants of any malware infection within just minutes and return the machine back to its original state by building a situational and contextual remediation. Unlike the traditional malware tools in the market, Triumfant Resolution Manager:

# Uses no signatures # Needs no previous knowledge of the malware or its variants # Continuously scans the desktop in real-time, looking for changes caused by malware # Requires no human intervention to write a remediation # Remediates all collateral damage to a machine

Triumfant will be demonstrating Resolution Manager at RSA Conference 2010, March 1-5, at the Moscone Center in San Francisco in booth #756. Follow the Triumfant blog and twitter account for live updates on the Malware Detection Challenge: "You Bring It; We Find It" challenge. More details on the challenge are available at

To register for the RSA Conference, please visit:

About Triumfant

Triumfant leverages patented analytics to detect malicious attacks that evade traditional endpoint protection solutions. The Triumfant Resolution Manager discovers, diagnoses and repairs unwanted changes and builds situational remediations that address an attack and all collateral damage to return the machine to its pre-attack condition in real-time. Triumfant uses these same analytics to continually enforce security configurations and policies, ensuring that organizations start every day with their endpoints secure and audit ready. For more information about Triumfant, visit

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights