Welcome!

News Feed Item

Tenable Integration with ThreatGRID Enhances Detection of Persistent Malware

Tenable Network Security®, Inc., the leader in continuous monitoring of vulnerabilities, threats and compliance, today announced its latest new source of threat analytics through an integration with ThreatGRID’s malware analysis and threat intelligence solution. This integration enhances Tenable’s dynamic library of known threats from the industry’s top 25 antivirus vendors, improves accuracy and reduces the time to detect advanced malware that bypass traditional security controls.

The addition of ThreatGRID’s securely crowdsourced intelligence gives Tenable customers a high-impact edge to stay ahead of advanced threats. In particular, the solution enhances customers’ ability to detect persistent malware, finding systems that have been infected even when the malware is dormant during the time of audit. Tenable continually adds new sources of intelligence to its SecurityCenter Continuous View™ and Nessus® platforms, making them uniquely able to identify advanced threats that are exploiting vulnerable assets, and identify those assets already compromised. Unlike other solutions, Tenable’s SecurityCenter CV platform allows customers to do all of the following:

  • Analyze running processes to detect suspicious and malicious processes on physical and virtual operating systems
  • Identify devices on the network communicating with known botnets and CnC servers
  • Highlight complex threats, trojans, botnets and other sophisticated malware
  • Discover configuration files that were altered by malware
  • Monitor registry settings for signs of compromise
  • Audit AV tools to ensure they are operational and up-to-date with the latest protection

Tenable’s risk-aware threat management model combines vulnerability data from continuous monitoring with threat intelligence from known and rapidly changing malware. This not only provides 100% vulnerability and threat visibility, but also prioritizes detected threats to critical, vulnerable assets.

ThreatGRID boosts Tenable’s malware detection by securely crowdsourcing and analyzing a large volume of malware to provide high fidelity threat intelligence content with global and historical context. Tenable uses ThreatGRID content to enrich data generated from multiple sources to improve the speed and quality of detection of advanced attacks.

“As we add new sources of threat intelligence, we look to help customers make fast, smart risk decisions that protect their organizations from threats that bypass point security product deployments,” said Ron Gula, CEO of Tenable Network Security. “Our integration with ThreatGRID brings important crowdsourced intelligence into our platform.”

“Today’s advanced and targeted attacks are built to evade existing defenses and detection, so ThreatGRID offers a new line of sight into threats on networks and endpoints,” said Dov Yoran, Co-founder and CEO of ThreatGRID. “We are excited that Tenable is making us part of their already strong defense against cyber threats for their customers in all sectors and around the world, enabling them to rapidly and confidently defend against these threats.”

For more information, please visit www.tenable.com.

About ThreatGRID

ThreatGRID is the first unified malware analysis and threat intelligence solution that is revolutionizing how organizations use accurate and context-rich intelligence to defend against advanced cyber attacks. ThreatGRID customers include large organizations across a number of verticals such as financial services, government, healthcare, energy, manufacturing and more. ThreatGRID securely crowdsources large volumes of malware and performs advanced analysis in the cloud, to identify key behavioral indicators enabling near real-time remediation. ThreatGRID empowers security teams with continuous real-time threat intelligence, enriched by global and historical context, to prevent future attacks. ThreatGRID’s API simplifies sample submission and intelligence integration with EnCase® Enterprise and other security products to maximize the effectiveness of existing investments. Founded by entrepreneurs with deep security expertise, ThreatGRID is privately held and is based in New York City. For more information, visit www.threatgrid.com, read our blog, follow us on Twitter @ThreatGRID and LinkedIn.

About Tenable Network Security

Tenable Network Security is relied upon by more than 20,000 organizations, including the entire U.S. Department of Defense and many of the world’s largest companies and governments, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its solutions continue to set the standard to identify vulnerabilities, prevent attacks and comply with a multitude of regulatory requirements. For more information, please visit www.tenable.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Building a cross-cloud operational model can be a daunting task. Per-cloud silos are not the answer, but neither is a fully generic abstraction plane that strips out capabilities unique to a particular provider. In his session at 20th Cloud Expo, Chris Wolf, VP & Chief Technology Officer, Global Field & Industry at VMware, will discuss how successful organizations approach cloud operations and management, with insights into where operations should be centralized and when it’s best to decentraliz...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Analytic. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Developers want to create better apps faster. Static clouds are giving way to scalable systems, with dynamic resource allocation and application monitoring. You won't hear that chant from users on any picket line, but helping developers to create better apps faster is the mission of Lee Atchison, principal cloud architect and advocate at New Relic Inc., based in San Francisco. His singular job is to understand and drive the industry in the areas of cloud architecture, microservices, scalability ...
Five years ago development was seen as a dead-end career, now it’s anything but – with an explosion in mobile and IoT initiatives increasing the demand for skilled engineers. But apart from having a ready supply of great coders, what constitutes true ‘DevOps Royalty’? It’ll be the ability to craft resilient architectures, supportability, security everywhere across the software lifecycle. In his keynote at @DevOpsSummit at 20th Cloud Expo, Jeffrey Scheaffer, GM and SVP, Continuous Delivery Busine...
Most technology leaders, contemporary and from the hardware era, are reshaping their businesses to do software in the hope of capturing value in IoT. Although IoT is relatively new in the market, it has already gone through many promotional terms such as IoE, IoX, SDX, Edge/Fog, Mist Compute, etc. Ultimately, irrespective of the name, it is about deriving value from independent software assets participating in an ecosystem as one comprehensive solution.
SYS-CON Events announced today that T-Mobile will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. As America's Un-carrier, T-Mobile US, Inc., is redefining the way consumers and businesses buy wireless services through leading product and service innovation. The Company's advanced nationwide 4G LTE network delivers outstanding wireless experiences to 67.4 million customers who are unwilling to compromise on ...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
SYS-CON Events announced today that CollabNet, a global leader in enterprise software development, release automation and DevOps solutions, will be a Bronze Sponsor of SYS-CON's 20th International Cloud Expo®, taking place from June 6-8, 2017, at the Javits Center in New York City, NY. CollabNet offers a broad range of solutions with the mission of helping modern organizations deliver quality software at speed. The company’s latest innovation, the DevOps Lifecycle Manager (DLM), supports Value S...
Cybersecurity is a critical component of software development in many industries including medical devices. However, code is not always written to be robust or secure from the unknown or the unexpected. This gap can make medical devices susceptible to cybersecurity attacks ranging from compromised personal health information to life-sustaining treatment. In his session at @ThingsExpo, Clark Fortney, Software Engineer at Battelle, will discuss how programming oversight using key methods can incre...