|By Marketwired .||
|August 6, 2014 08:03 AM EDT||
SANTA CLARA, CA -- (Marketwired) -- 08/06/14 -- Cyphort, a pioneer of Advanced Threat Defense (ATD) solutions, today announced the launch of its Partner Ecosystem (detailed in a separate release, also issued today) featuring a partnership with Bit9 + Carbon Black. Cyphort is integrating its network-based approach to Advanced Threat Defense with Carbon Black's endpoint threat detection and response product, enabling organizations to deploy complete and reliable protection against advanced attacks across network and endpoint assets. As part of the partnership, Cyphort and Bit9 + Carbon Black will also share threat intelligence.
"The Cyphort-Carbon Black integration enables us to zoom in on potentially risky attacks much faster than if we leveraged each one individually, increasing our productivity and enabling us to more strategically mitigate risk," said Brian Johnson, manager, Netflix Information Security. "Cyphort and Bit9 + Carbon Black are already trusted partners that have proven their value; that they took the initiative to integrate their solution in such a useful way increases our ability to efficiency and effectively defend our network against advanced attacks, and serves as a powerful example of how best-of breed companies can work together to increase the value they provide to their customers."
Cyphort - Carbon Black: Unparalleled Advanced Threat Defense
The Cyphort-driven collaboration leverages the open, API-based architecture of both solutions to deliver a best-of-breed offering that addressed customer-driven use cases. As Cyphort detects malware on the network, Carbon Black can determine if the detected malware executed on an endpoint, and how many machines were affected. This real-time, closed-loop visibility enables security analysts to filter out non-actionable events, prioritize high-impact alerts faster, improving response times to potential intrusions.
By querying Carbon Black to show the behavior of the files and processes on the targeted endpoint, the Cyphort Platform can better determine exactly where an attack sits in the kill chain and if a download progressed to infection by showing what the malware did on the endpoint, expediting targeted and accurate remediation.
This integration allows organizations to act quickly and with certainty when malicious objects are detected. Additionally, by sharing threat intelligence, joint customers can correlate Cyphort and Carbon Black threat data to beef up prevention strategies and respond better and faster to Zero Days and other modern attacks.
"The ability to incorporate Carbon Black's endpoint intelligence into our threat ranking processes increases the value of our solution to customers," said Anthony James, Vice President of Marketing and Products for Cyphort. By sharing threat intelligence, we are walking our talk about how information sharing should be the rule and not the exception. We look forward to deepening our relationship with Bit9 + Carbon Black, a company that understands and shares our vision for Advanced Threat Defense."
"Network and endpoint-based approaches to threat defense solutions can no longer operate in silos; they must work together to deliver complete actionable intelligence from the network to endpoints and servers," said Tom Barsi, vice president of business development for Bit9 + Carbon Black. "We applaud Cyphort for using Carbon Black's open API to integrate with our product. This is a great example of the power of our API to deliver an integration that provides real value to customers. Cyphort is exceptional in its commitment to sharing threat intelligence. We hope this level of openness and collaboration becomes an industry standard."
The Cyphort solution is available immediately, and is included as part of the Cyphort Advanced Threat Platform 3.0.
Cyphort is innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster, more effectively, and in as surgical a manner as their attackers. Cyphort's software-based, distributed architecture offers a cost effective, high performance approach to detecting and protecting an organization's virtual, physical and cloud infrastructure against sophisticated attacks. Malware detection for Windows, OSX and Linux allows businesses to extract maximum value from IT assets without compromising the security of an organization. Founded by experts in advanced threats from government intelligence agencies and premier network security companies, Cyphort is a privately held company headquartered in San Jose, California. For more information, please visit: www.cyphort.com.
Qosmos, the market leader for IP traffic classification and network intelligence technology, has announced that it will launch the Launch L7 Viewer at CloudExpo | @ThingsExpo Silicon Valley, being held November 1 – 3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The L7 Viewer is a traffic analysis tool that provides complete visibility of all network traffic that crosses a virtualized infrastructure, up to Layer 7. It facilitates and accelerates common IT tasks such as VM migra...
Oct. 26, 2016 07:30 PM EDT Reads: 364
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
Oct. 26, 2016 07:00 PM EDT Reads: 2,340
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, health...
Oct. 26, 2016 06:30 PM EDT Reads: 1,656
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Oct. 26, 2016 06:30 PM EDT Reads: 1,082
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Oct. 26, 2016 06:15 PM EDT Reads: 1,145
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, will contrast how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He will show the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He will also have live demos of building immutable pipe...
Oct. 26, 2016 05:45 PM EDT Reads: 1,657
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Oct. 26, 2016 05:30 PM EDT Reads: 1,510
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
Oct. 26, 2016 05:15 PM EDT Reads: 1,266
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Oct. 26, 2016 05:00 PM EDT Reads: 9,061
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
Oct. 26, 2016 05:00 PM EDT Reads: 4,205
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, you'll learn about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how Docke...
Oct. 26, 2016 04:30 PM EDT Reads: 1,670
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that ...
Oct. 26, 2016 04:15 PM EDT Reads: 373
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Oct. 26, 2016 04:00 PM EDT Reads: 3,828
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Oct. 26, 2016 04:00 PM EDT Reads: 2,120
Governments around the world are adopting Safe Harbor privacy provisions to protect customer data from leaving sovereign territories. Increasingly, global companies are required to create new instances of their server clusters in multiple countries to keep abreast of these new Safe Harbor laws. Is it worth it? In his session at 19th Cloud Expo, Adam Rogers, Managing Director of Anexia, Inc., will discuss how to keep your data legal and still stay in business.
Oct. 26, 2016 03:45 PM EDT Reads: 1,511