News Feed Item

Tenable Integration with ThreatGRID Enhances Detection of Persistent Malware

Tenable Network Security®, Inc., the leader in continuous monitoring of vulnerabilities, threats and compliance, today announced its latest new source of threat analytics through an integration with ThreatGRID’s malware analysis and threat intelligence solution. This integration enhances Tenable’s dynamic library of known threats from the industry’s top 25 antivirus vendors, improves accuracy and reduces the time to detect advanced malware that bypass traditional security controls.

The addition of ThreatGRID’s securely crowdsourced intelligence gives Tenable customers a high-impact edge to stay ahead of advanced threats. In particular, the solution enhances customers’ ability to detect persistent malware, finding systems that have been infected even when the malware is dormant during the time of audit. Tenable continually adds new sources of intelligence to its SecurityCenter Continuous View™ and Nessus® platforms, making them uniquely able to identify advanced threats that are exploiting vulnerable assets, and identify those assets already compromised. Unlike other solutions, Tenable’s SecurityCenter CV platform allows customers to do all of the following:

  • Analyze running processes to detect suspicious and malicious processes on physical and virtual operating systems
  • Identify devices on the network communicating with known botnets and CnC servers
  • Highlight complex threats, trojans, botnets and other sophisticated malware
  • Discover configuration files that were altered by malware
  • Monitor registry settings for signs of compromise
  • Audit AV tools to ensure they are operational and up-to-date with the latest protection

Tenable’s risk-aware threat management model combines vulnerability data from continuous monitoring with threat intelligence from known and rapidly changing malware. This not only provides 100% vulnerability and threat visibility, but also prioritizes detected threats to critical, vulnerable assets.

ThreatGRID boosts Tenable’s malware detection by securely crowdsourcing and analyzing a large volume of malware to provide high fidelity threat intelligence content with global and historical context. Tenable uses ThreatGRID content to enrich data generated from multiple sources to improve the speed and quality of detection of advanced attacks.

“As we add new sources of threat intelligence, we look to help customers make fast, smart risk decisions that protect their organizations from threats that bypass point security product deployments,” said Ron Gula, CEO of Tenable Network Security. “Our integration with ThreatGRID brings important crowdsourced intelligence into our platform.”

“Today’s advanced and targeted attacks are built to evade existing defenses and detection, so ThreatGRID offers a new line of sight into threats on networks and endpoints,” said Dov Yoran, Co-founder and CEO of ThreatGRID. “We are excited that Tenable is making us part of their already strong defense against cyber threats for their customers in all sectors and around the world, enabling them to rapidly and confidently defend against these threats.”

For more information, please visit www.tenable.com.

About ThreatGRID

ThreatGRID is the first unified malware analysis and threat intelligence solution that is revolutionizing how organizations use accurate and context-rich intelligence to defend against advanced cyber attacks. ThreatGRID customers include large organizations across a number of verticals such as financial services, government, healthcare, energy, manufacturing and more. ThreatGRID securely crowdsources large volumes of malware and performs advanced analysis in the cloud, to identify key behavioral indicators enabling near real-time remediation. ThreatGRID empowers security teams with continuous real-time threat intelligence, enriched by global and historical context, to prevent future attacks. ThreatGRID’s API simplifies sample submission and intelligence integration with EnCase® Enterprise and other security products to maximize the effectiveness of existing investments. Founded by entrepreneurs with deep security expertise, ThreatGRID is privately held and is based in New York City. For more information, visit www.threatgrid.com, read our blog, follow us on Twitter @ThreatGRID and LinkedIn.

About Tenable Network Security

Tenable Network Security is relied upon by more than 20,000 organizations, including the entire U.S. Department of Defense and many of the world’s largest companies and governments, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its solutions continue to set the standard to identify vulnerabilities, prevent attacks and comply with a multitude of regulatory requirements. For more information, please visit www.tenable.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue an...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and microservices. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your conta...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his session at @DevOpsSummit 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will show how customers are able to achieve a level of transparency that enables everyon...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
DevOps theory promotes a culture of continuous improvement built on collaboration, empowerment, systems thinking, and feedback loops. But how do you collaborate effectively across the traditional silos? How can you make decisions without system-wide visibility? How can you see the whole system when it is spread across teams and locations? How do you close feedback loops across teams and activities delivering complex multi-tier, cloud, container, serverless, and/or API-based services?
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
So you think you are a DevOps warrior, huh? Put your money (not really, it’s free) where your metrics are and prove it by taking The Ultimate DevOps Geek Quiz Challenge, sponsored by DevOps Summit. Battle through the set of tough questions created by industry thought leaders to earn your bragging rights and win some cool prizes.
Today every business relies on software to drive the innovation necessary for a competitive edge in the Application Economy. This is why collaboration between development and operations, or DevOps, has become IT’s number one priority. Whether you are in Dev or Ops, understanding how to implement a DevOps strategy can deliver faster development cycles, improved software quality, reduced deployment times and overall better experiences for your customers.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...