Welcome!

Java IoT Authors: Liz McMillan, Jason Bloomberg, Elizabeth White, Yeshim Deniz, Zakia Bouachraoui

News Feed Item

Invincea Announces Expanded Threat Intelligence Integration in Invincea Management Service v2.0

Broadens Ecosystem of Threat Intelligence Partners With One-Click Product Integrations With ThreatGRID(R) and ReversingLabs

SAN FRANCISCO, CA and FAIRFAX, VA -- (Marketwired) -- 02/24/14 -- Invincea, the market leader in the use of secure virtual containers for user protection against advanced cybersecurity threats, today announced the expansion of its integrated threat intelligence network for Invincea Management Service (IMS) v2.0, available as a cloud-hosted offering or on-premises customer-managed virtual image. The new release gives enterprises the ability to fuse threat forensics reported from Invincea-protected endpoints with threat intelligence from an expanding partner network now including ThreatGRID® and ReversingLabs. The approach of collecting forensics from thwarted attacks to map the adversary creates a real-time feedback loop for enterprise security teams to protect users from targeted and incidental attacks while gaining a deeper understanding of the attack type and threat scape for their enterprise.

Invincea's "left of boom" approach to user protection -- a military and intelligence term that means to counter the adversary before compromise ("boom") happens -- places it in a unique position to detect and thwart spear-phishing, watering hole and drive-by web-based attacks whether advanced or conventional, whether they use known, unknown or zero-day exploits. Rich forensics collected from each thwarted attack are forwarded to the Invincea Management Service and then fused with threat intelligence to understand the attack type and adversarial profile behind the attacks. The approach allows security and incident response teams to move the security response process more to "left of boom."

With the launch of IMS v2.0, Invincea's customers benefit from enhanced functionality for enterprise management of their FreeSpace™ protected endpoints -- enabling management of core client configurations, the management of groups with different configurations, and providing a robust dashboard for visualizing blocked attacks. IMS v2.0 also provides security and incident response teams with real-time views into thwarted infections, timeline of attacks, file system and registry changes, new malicious process launches and botnet command and control networks. See the video that demonstrates these capabilities.

ThreatGRID's service empowers Invincea users to submit URLs and executable files for static and dynamic analysis directly from the IMS v2.0 interface. This integration enables Invincea users to chart the origins of the thwarted attack, identify criminal networks connected to various strains of malware, and understand past uses of identified command and control infrastructure and more. ThreatGRID analyzes hundreds of thousands of samples daily to provide security practitioners with context-rich intelligence. This intelligence is automatically delivered from ThreatGRID's repository of analyzed malware content, enabling security teams to quickly prioritize and fully investigate attacks, and proactively defend against future threats. For a look at Invincea's integration with ThreatGRID, see this video.

Reversing Labs' TitaniumCloud™ threat intelligence services enables Invincea-protected enterprises to check contained executable files and documents to understand their reputation and capabilities. For a look at Invincea's integration with ReversingLabs, see this video.

Invincea Management Service 2.0 also integrates with a number of other leading advanced technologies commonly deployed in Security Operations Centers (SOPs), including McAfee ePO, ArcSight, IBM Security QRadar, Splunk, RSA NetWitness and ISIGHT Partners. With the new integrations with ThreatGRID and ReversingLabs, Invincea is expanding its Threat Intelligence partner network to allow Invincea-protected enterprises the ability to fuse rich forensics from thwarted attacks contained by Invincea FreeSpace with the deep threat and analytical capabilities from both firms.

Invincea's software is now deployed in more than 11,000 organizations worldwide -- protecting dozens of industry verticals such as financial services, retail, energy, oil & gas, high tech, healthcare, retail, transportation, defense industrial, federal and state government agencies and companies. In June 2013, Invincea became the first advanced malware threat protection technology to ship straight from the factory on all Dell commercial devices under the brand name of Dell Data Protection | Protected Workspace. These machines include: Precision, Latitude, and Optiplex machines. The OEM deal announced by Dell is now shipping Invincea on more than 60 million devices globally over the next three years.

Follow Invincea
Invincea Blog: http://www.invincea.com/knowledge-center/blogs/
Videos: http://www.invincea.com/knowledge-center/videos/
Webinar Series: http://www.invincea.com/knowledge-center/webinar-recording-sessions/
Twitter: @Invincea

About Invincea, Inc.

Invincea is the premier innovator in advanced malware threat detection, breach prevention, and forensic threat intelligence. Invincea is the market-leading solution that provides organizations of all sizes -- enterprises to small-medium businesses -- with coverage against the largest attack surface for cyber-breach attacks aimed at end-users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections. Invincea's platform seamlessly moves the browser, PDF reader, Java, and Microsoft Office suite from the native operating system into secure virtualized environments without altering the user experience. The company, founded by Dr. Anup Ghosh to address the rapidly increasing security threat from nation states, cyber-crime, and rogue actors, has commercialized technology originally built under DARPA funding. The company is venture capital-backed and based in Fairfax, VA. For more information, visit http://www.invincea.com.

About ThreatGRID, Inc.

ThreatGRID is the first unified malware analysis and threat intelligence solution that is revolutionizing how organizations use accurate and context-rich intelligence to defend against advanced cyber attacks. ThreatGRID securely crowdsources large volumes of malware and performs advanced analysis in the cloud, to identify key behavioral indicators enabling near real-time remediation. ThreatGRID empowers security teams with continuous real-time threat intelligence, enriched by global and historical context, to prevent future attacks. ThreatGRID's API simplifies sample submission and intelligence integration with other security products to maximize the effectiveness of existing investments. Founded by entrepreneurs with deep security expertise, ThreatGRID is privately held and is based in New York City. For more information, visit www.threatgrid.com and follow us on Twitter @ThreatGRID.

About ReversingLabs

ReversingLabs solutions provide enterprises and security vendors a foundation for protecting digital assets. These solutions enable security professionals to detect and analyze the latest and most advanced cyber threats on computers, mobile devices and embedded systems. TitaniumCore™, the company's automated analysis software platform dissects binary files without execution in order to extract proactive threat indicators that determine threat level, capabilities and intent. The T1000 knowledgebase enables unknown file identification and provides threat intelligence on billions of goodware and malware files.

The company's global customers come from a number of sectors including security vendors, government agencies and commercial enterprises. ReversingLabs is privately held with employees in the United States, Croatia and Switzerland. For more information, visit http://www.reversinglabs.com or call +1 617-250-7518.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Jennifer Torode
CHEN PR, Inc.
Email Contact
781-672-3119

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.