ThreatTrack 2.0 plugs malware holes in real-time
Posted on 17 January 2013.
GFI Software launched GFI ThreatTrack 2.0, the latest version of the security intelligence solution that provides users with visibility into the threat landscape. It produces a range of data streams containing more than 69 million malicious URLs, IP addresses and other malware samples.

ThreatTrack users rely on this actionable intelligence to play a part in their efforts to stop malicious websites, emails and other Internet traffic before they can put corporate networks at risk. For example, security integrators and in-house IT security teams integrate ThreatTrack data streams into their security infrastructure to strengthen firewall filtering and third-party proxy solutions, and to respond to emerging threats faster than ever before.

Security vendors leverage ThreatTrack to populate their malware reputation database with the latest threats in order to better defend their customers. Additionally, academic researchers use ThreatTrack’s data to predict and track malware, and thus, assist the IT security community in their efforts to combat cybercrime.

“When you are up against sophisticated cybercriminals, every minute counts,” said Julian Waits, general manager of GFI Software’s Security Business Unit. “Zero-day malware threats are much harder for security systems to detect than known malicious files that are already blacklisted. The security industry and the academic world work together closely to analyse new and evolving malware samples and identify ways to stop these threats before they can infect enterprise networks. ThreatTrack can be an invaluable part of this process, as it provides the real-time intelligence needed to combat malware as cybercriminals look for new backdoor vulnerabilities to target.”

The latest version of ThreatTrack provides users with up to seven times the data available in version 1.0. Users can now also access the powerful data they have come to rely on to catch malware threats quicker and easier than ever before – which can mean the difference between suffering a breach or remaining secure.

Additional benefits of ThreatTrack 2.0 include:

Increased accessibility – Previously available through a file transfer protocol (FTP) site, ThreatTrack 2.0 data streams are now accessible via a REST API, providing customers with direct, real-time access to continuously updated information. Users no longer have to struggle with large FTP downloads to get their hands on malware data essential to their organisation.

Real-time accessibility – ThreatTrack 2.0 data streams are updated in near real-time to provide customers with immediate access to information about the latest malware threats.

Enhanced customisation – Through the REST API, customers can now also tailor data retrieval to their own personal needs. They can customise the type and amount of data they download to ensure they are analysing only the information that is pertinent to their organisation.

Flexible formatting – Users can now select from XML, JSON or TXT formatting options so data streams are easily integrated into their products.





Spotlight

Patching: The least understood line of defense

Posted on 29 August 2014.  |  How many end users, indeed how many IT pros, truly get patching? Sure, many of us see Windows install updates when we shut down our PC and think all is well. It’s not.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Sep 3rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //