|By Marketwired .||
|August 6, 2014 08:03 AM EDT||
SANTA CLARA, CA -- (Marketwired) -- 08/06/14 -- Cyphort, a pioneer of Advanced Threat Defense (ATD) solutions, today announced the launch of its Partner Ecosystem (detailed in a separate release, also issued today) featuring a partnership with Bit9 + Carbon Black. Cyphort is integrating its network-based approach to Advanced Threat Defense with Carbon Black's endpoint threat detection and response product, enabling organizations to deploy complete and reliable protection against advanced attacks across network and endpoint assets. As part of the partnership, Cyphort and Bit9 + Carbon Black will also share threat intelligence.
"The Cyphort-Carbon Black integration enables us to zoom in on potentially risky attacks much faster than if we leveraged each one individually, increasing our productivity and enabling us to more strategically mitigate risk," said Brian Johnson, manager, Netflix Information Security. "Cyphort and Bit9 + Carbon Black are already trusted partners that have proven their value; that they took the initiative to integrate their solution in such a useful way increases our ability to efficiency and effectively defend our network against advanced attacks, and serves as a powerful example of how best-of breed companies can work together to increase the value they provide to their customers."
Cyphort - Carbon Black: Unparalleled Advanced Threat Defense
The Cyphort-driven collaboration leverages the open, API-based architecture of both solutions to deliver a best-of-breed offering that addressed customer-driven use cases. As Cyphort detects malware on the network, Carbon Black can determine if the detected malware executed on an endpoint, and how many machines were affected. This real-time, closed-loop visibility enables security analysts to filter out non-actionable events, prioritize high-impact alerts faster, improving response times to potential intrusions.
By querying Carbon Black to show the behavior of the files and processes on the targeted endpoint, the Cyphort Platform can better determine exactly where an attack sits in the kill chain and if a download progressed to infection by showing what the malware did on the endpoint, expediting targeted and accurate remediation.
This integration allows organizations to act quickly and with certainty when malicious objects are detected. Additionally, by sharing threat intelligence, joint customers can correlate Cyphort and Carbon Black threat data to beef up prevention strategies and respond better and faster to Zero Days and other modern attacks.
"The ability to incorporate Carbon Black's endpoint intelligence into our threat ranking processes increases the value of our solution to customers," said Anthony James, Vice President of Marketing and Products for Cyphort. By sharing threat intelligence, we are walking our talk about how information sharing should be the rule and not the exception. We look forward to deepening our relationship with Bit9 + Carbon Black, a company that understands and shares our vision for Advanced Threat Defense."
"Network and endpoint-based approaches to threat defense solutions can no longer operate in silos; they must work together to deliver complete actionable intelligence from the network to endpoints and servers," said Tom Barsi, vice president of business development for Bit9 + Carbon Black. "We applaud Cyphort for using Carbon Black's open API to integrate with our product. This is a great example of the power of our API to deliver an integration that provides real value to customers. Cyphort is exceptional in its commitment to sharing threat intelligence. We hope this level of openness and collaboration becomes an industry standard."
The Cyphort solution is available immediately, and is included as part of the Cyphort Advanced Threat Platform 3.0.
Cyphort is innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster, more effectively, and in as surgical a manner as their attackers. Cyphort's software-based, distributed architecture offers a cost effective, high performance approach to detecting and protecting an organization's virtual, physical and cloud infrastructure against sophisticated attacks. Malware detection for Windows, OSX and Linux allows businesses to extract maximum value from IT assets without compromising the security of an organization. Founded by experts in advanced threats from government intelligence agencies and premier network security companies, Cyphort is a privately held company headquartered in San Jose, California. For more information, please visit: www.cyphort.com.
Continuous processes around the development and deployment of applications are both impacted by -- and a benefit to -- the Internet of Things trend. To help better understand the relationship between DevOps and a plethora of new end-devices and data please welcome Gary Gruver, consultant, author and a former IT executive who has led many large-scale IT transformation projects, and John Jeremiah, Technology Evangelist at Hewlett Packard Enterprise (HPE), on Twitter at @j_jeremiah. The discussion...
Nov. 27, 2015 04:15 AM EST Reads: 701
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
Nov. 27, 2015 04:00 AM EST Reads: 210
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at Logz.io, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company Logz.io. In the past, he was co-founder of social-trading platform Currensee, which...
Nov. 27, 2015 04:00 AM EST Reads: 176
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Nov. 27, 2015 04:00 AM EST Reads: 318
Nov. 27, 2015 02:30 AM EST Reads: 449
Nov. 27, 2015 02:00 AM EST Reads: 514
Nov. 27, 2015 01:30 AM EST Reads: 460
Nov. 27, 2015 01:00 AM EST Reads: 458
Nov. 27, 2015 01:00 AM EST Reads: 306
Nov. 27, 2015 01:00 AM EST Reads: 420
Nov. 27, 2015 01:00 AM EST Reads: 555
Nov. 27, 2015 12:45 AM EST Reads: 393
Nov. 27, 2015 12:00 AM EST Reads: 332
Nov. 26, 2015 10:00 PM EST Reads: 395
Nov. 26, 2015 04:00 PM EST Reads: 384