Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 30 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Spring 2017 Release of Market-leading Malware Protection Solution Eliminates Browser-based Exploits, Accelerates Incident Investigation, and Alerts on Anomalous Network Traffic.

by The Gurus
February 9, 2017
in Editor's News, News
Share on FacebookShare on Twitter

Lastline Inc., the leader in advanced malware protection, announced its latest enhancements to Lastline Enterprise for Global 5000 companies. The Spring 2017 Release adds capabilities to detect and eliminate browser based-attacks, speed incident investigation for security professionals, and provide early warning of unusual or suspicious network activity.
“We worked very closely with our largest global customers and partners to identify enhancements that ensure our solution addresses attack vectors that are causing the most pain,” said Brian Laing, Vice President Product and Business Development. “We focused on detecting advanced browser-based threats that target unsuspecting end-users because these are impossible for legacy sandboxes to identify and prevent.”
This release also expands the ability for all organisations to benefit from the shared information stored within the Lastline Global Threat Intelligence Network. The company has substantially expanded the breadth, depth, and immediacy of threat intelligence data available to security analysts, for whom every second counts when trying to quickly understand and respond to malware and potentially damaging data breaches. Furthermore, the solution now includes network anomaly detection that speeds detection of malicious activity before a company suffers any data exfiltration.
“Customer response has been extremely positive. These additional features offer unparalleled visibility and protection, improving security team productivity and ultimately protecting their organisations against today’s advanced cyber attacks,” explained Laing.
Major enhancements of the Spring 2017 Release include:

  • Rapid detection of browser-based exploits.

Lastline Enterprise Web Threat Detection leapfrogs signature- and reputation-based detection technologies to provide superior visibility into and protection from web threats that target browser vulnerabilities and do not rely on files being downloaded onto victims’ devices. Criminals are hiding malicious JavaScript within HTML code that’s delivering rich web browser content. Security teams now have visibility into the actions taken by these drive-by attacks or other zero-day threats.

  • Faster incident response using shared global threat intelligence.

Security professionals now have expanded access to detailed malware Indicators of Compromise (IOCs) stored in the Lastline Global Threat Intelligence Network. Security Operations Center (SOC) Analysts can search the network to learn the behaviors of malicious code seen in the wild and leverage network and endpoint IOCs to apply the experience of other companies towards proactively defending their organisation against targeted attacks. Security professionals now can analyse threats within the global threat context, including information about attack types, frequency, and alignment with an overall malware campaign.
Lastline customers also now can receive alerts when IOCs matching user-defined criteria are detected by any Lastline customer or partner, or were previously captured in the Global Threat Intelligence Network. For instance, security teams can be alerted when malware is identified targeting their company. Security teams can proactively use this advanced reconnaissance to defend against the attack vectors prior to any malware infiltration.

  • Automated detection of anomalous network traffic.

Lastline Enterprise can now detect suspicious network traffic and issue an alert to security analysts. Anomalous network behavior is often a precursor to data exfiltration, and detecting it enables security analysts to respond before suffering any data loss. SOC Analysts and Network Administrators will see how active traffic compares to historic norms, spotting anomalies that often are early indicators of compromised systems.
Lastline Enterprise also associates anomalous network traffic patterns with malware behavior, allowing for faster remediation of data breaches. Security professionals gain visibility into security threats that target explicit devices  – for example, IP addresses and protocols – and identify policy violations.
For more information on the Spring 2017 Release of Lastline Enterprise and how any organisation can fight advanced malware attacks, please contact Lastline.
About Lastline
Lastline is innovating the way companies detect active breaches caused by advanced persistent threats, targeted attacks, and evasive malware. Headquartered in Redwood City, California with offices throughout North America, Europe and Asia, Lastline’s platform is used by global managed security service providers, Global 5000 enterprises and leading security vendors worldwide. www.lastline.com.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Positive Technologies launches PT VIP Protect to allow mobile operators to safeguard high-profile figures from targeted phone hacks

Next Post

India's proposed mass surveillance programme seen as a blow to internet freedom

Recent News

cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023
Outside of cinema with advertising

Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information