Welcome!

News Feed Item

Agari Launches Groundbreaking Threat Intelligence Solution to Detect Malicious Attacks in Real-Time

Agari, the leading provider of real-time data-driven security solutions, today announced the availability of Real-Time Threat Intelligence (RTTI), a solution for global brands and security partners that detects malicious IP addresses and URLs used within email attacks in real time. The announcement was made in conjunction with the Financial Services Information Sharing and Analysis Center (FS-ISAC) Annual Summit, responding to the need and importance of email intelligence in the financial services sector.

Powered by a global detection network collecting intelligence from over 2.5 billion global mailboxes, Agari’s RTTI solution provides threat teams and enterprise security vendors with unprecedented visibility and actionable intelligence. Already deployed at dozens of Global 2000 companies, RTTI allows companies to detect attacks in real time before they scale, collect information on malware and APTs that other techniques miss, and learn where brand and domain abuse originates. RTTI leverages the same threat intelligence that powered the Citadel botnet takedown by Microsoft and FBI, and that won JPMorgan Chase’s Hall of Innovation award. The solution enables enterprises and takedown vendors (companies that take confirmed malicious links/URLs offline) to dramatically speed response and remediation times, catching threats that other detection methods miss.

“Email security is more critical now than ever before, and brands can’t afford to risk the damage caused by an email attack,” said Patrick Peterson, CEO of Agari. “RTTI’s speed of detecting malicious IP addresses and URLs is a critical prerequisite to stopping attacks, preventing widespread damage to both companies and their customers.” Gartner indicates in their recent report, Context-Aware Security and Intelligence-Sharing Concepts Merge to Create Intelligence-Aware Security Controls, “Recent advanced attacks continue to demonstrate weakness in preventive controls, which is forcing the evolution of security technology to use non-signature-based methods, or rely more on intelligence and analytics to find attacks."1

RTTI is built upon Agari’s award-winning cloud-based SaaS data platform, which helps companies detect, take action, and prevent the advanced email cyberthreats that are targeting end users today. Powered by a global detection network that aggregates unique email data from Global ISPs, Local ISPs, and the largest email senders on the planet, Agari’s RTTI solution provides threat teams and enterprise security vendors with unprecedented visibility and actionable intelligence.

Key features of Agari RTTI include:

  • Real-Time Threat Feeds: detect phishing URLs, potential malware and APTs in real-time and before attacks scale. Route the feed to your threat intelligence and security appliance vendors to augment their solutions and for faster mitigation of threats.
  • Threat Alerts: gain intelligence on unique data and insights, including the top five sources of potential phishing attacks.
  • Attack reports: receive daily reports summarizing suspicious email activity prevented, helping brands keep a pulse on where domain abuse is coming from.

Agari’s real-time detection network is enabled by DMARC, an email security standard that has seen rapid adoption, with support from 85% of the inboxes in the US and 60% of the inboxes worldwide. DMARC allows brands to be in control of their email channel and definitively communicate to receivers which email is from them and which email is not.

For more information about Agari RTTI, please visit http://agari.com/products/real-time-threat-intelligence/. Agari RTTI is available now.

RELATED LINKS AND CONVERSATIONS

About Agari

Agari collects terabytes of email data from email receivers like Gmail and Yahoo! representing 85% of the email inboxes in the U.S., to provide global brands with a cloud-based SaaS solution that eliminates email threats, protects customers and their personal data, and proactively guards brand reputation. Today, Agari has analyzed over a trillion emails, and has blocked over a 2.5 billion malicious messages at a clip of over 200 per second. Founded by the thought leaders behind Cisco’s IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award, is headquartered in Silicon Valley. Learn more at http://www.agari.com.

1 Gartner Report: Context-Aware Security and Intelligence-Sharing Concepts Merge to Create Intelligence-Aware Security Controls, Lawrence Pingree, Ruggero Contu, Eric Ahlm, 13 March 2014

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, explained the best practices of continuous testing at high scale, which is rele...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...