ThreatTrack 2.0 plugs malware holes in real-time
Posted on 17 January 2013.
Bookmark and Share
GFI Software launched GFI ThreatTrack 2.0, the latest version of the security intelligence solution that provides users with visibility into the threat landscape. It produces a range of data streams containing more than 69 million malicious URLs, IP addresses and other malware samples.

ThreatTrack users rely on this actionable intelligence to play a part in their efforts to stop malicious websites, emails and other Internet traffic before they can put corporate networks at risk. For example, security integrators and in-house IT security teams integrate ThreatTrack data streams into their security infrastructure to strengthen firewall filtering and third-party proxy solutions, and to respond to emerging threats faster than ever before.

Security vendors leverage ThreatTrack to populate their malware reputation database with the latest threats in order to better defend their customers. Additionally, academic researchers use ThreatTrack’s data to predict and track malware, and thus, assist the IT security community in their efforts to combat cybercrime.

“When you are up against sophisticated cybercriminals, every minute counts,” said Julian Waits, general manager of GFI Software’s Security Business Unit. “Zero-day malware threats are much harder for security systems to detect than known malicious files that are already blacklisted. The security industry and the academic world work together closely to analyse new and evolving malware samples and identify ways to stop these threats before they can infect enterprise networks. ThreatTrack can be an invaluable part of this process, as it provides the real-time intelligence needed to combat malware as cybercriminals look for new backdoor vulnerabilities to target.”

The latest version of ThreatTrack provides users with up to seven times the data available in version 1.0. Users can now also access the powerful data they have come to rely on to catch malware threats quicker and easier than ever before – which can mean the difference between suffering a breach or remaining secure.

Additional benefits of ThreatTrack 2.0 include:

Increased accessibility – Previously available through a file transfer protocol (FTP) site, ThreatTrack 2.0 data streams are now accessible via a REST API, providing customers with direct, real-time access to continuously updated information. Users no longer have to struggle with large FTP downloads to get their hands on malware data essential to their organisation.

Real-time accessibility – ThreatTrack 2.0 data streams are updated in near real-time to provide customers with immediate access to information about the latest malware threats.

Enhanced customisation – Through the REST API, customers can now also tailor data retrieval to their own personal needs. They can customise the type and amount of data they download to ensure they are analysing only the information that is pertinent to their organisation.

Flexible formatting – Users can now select from XML, JSON or TXT formatting options so data streams are easily integrated into their products.





Spotlight

Nine patterns make up 92 percent of security incidents

Posted on 23 April 2014.  |  Researchers have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack patterns that vary from industry to industry.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //