Webroot delivers APT protection for enterprises
Posted on 27 February 2014.
Webroot announced the release of BrightCloud Security Services and BreachLogic Endpoint Agent, two cloud-based security offerings designed to help enterprises address the explosive growth and increasing sophistication of online threats, particularly targeted attacks such as “spearphishing” and advanced persistent threats (APTs).


When combating targeted attacks, one of the primary issues businesses face is an inability to correlate anomalous events in their IT environment with current, accurate, and actionable security intelligence, making it difficult to determine if and where a threat exists. Because malware is typically a component of these advanced attacks, it is also critical that businesses understand the behaviour of applications running on their endpoints, and the reputation of files entering their environment.

BrightCloud Security Services redefine online threat intelligence. The suite of cloud-based services, powered by a self-learning threat analysis platform that continuously scans the internet, is designed to help enterprises and OEM technology partners strengthen their security technology with accurate and actionable threat intelligence. The enhanced suite includes a new File Reputation Service and an enriched contextual database that correlates previously disparate security data points.

Traditional, reactive, list-based security that works by recognizing known threats is powerless to stop modern malware that is purpose-built to attack a single target. Brightcloud Security Services use a new three-dimensional approach threat intelligence to identify and stop these sophisticated threats. This approach includes:
  • Breadth of services to cover all critical threat sources – internet, file, and mobile
  • Cloud-based big data architecture with real-time threat intelligence
  • Greater depth of analysis by correlating disparate data.
Brightcloud Security Services include Web Reputation, Web Classification, IP Reputation, File Reputation, Real-Time Anti-Phishing, Mobile App Reputation, Mobile Security SDK, and the SecureWeb Browser SDK. They are delivered through Webroot’s OEM partners – including many leading network security providers – via a single API, enabling them to protect their customers at the moment of truth when advanced cyber-attacks appear both inside and outside of their networks.

All of these services leverage the vast security intelligence of the cloud-based Webroot Intelligence Network, which continually captures, analyses, classifies, and publishes intelligence on URLs, IPs, mobile apps and files; and analyses not only behaviour, but also correlates relationships to reputable and malicious websites, IPs, files, and mobile apps through a proprietary correlation engine.

The BreachLogic Endpoint Agent delivers the same cloud-based threat analysis in a next-generation endpoint security solution for clients, servers and mobile devices. It provides early detection and blocking of advanced malware attacks and enables rapid investigation and remediation in the event of a breach. By monitoring endpoint applications, processes and events against Webroot threat intelligence, it recognizes and stops never-before-seen threats that can pass unchecked by existing network and endpoint security technology.

Designed to integrate into the existing IT environment, the BreachLogic Endpoint Agent complements network security technologies and endpoint antivirus, providing an additional layer of protection against attacks that infiltrate or bypass the network perimeter.

The BreachLogic Endpoint Agent’s continuous monitoring provides visibility into endpoint applications, events, and processes and applies real-time behavioural and contextual analysis from the Webroot Intelligence Network to identify existing breaches and prevent future attacks. Security teams can easily manage endpoint alerts with the web-based Webroot console or integrate Webroot endpoint data into their existing management environment. The BreachLogic Endpoint Agent also provides detailed forensic data to assist security teams investigating the source and scope of a breach to identify vulnerabilities and prevent future infiltration.






Spotlight

The security threat of unsanctioned file sharing

Posted on 31 October 2014.  |  Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //