Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SAN DIEGO, CA -- (Marketwired) -- 04/14/15 -- iboss Cybersecurity today announced the FireSphere Threat Isolator, an integration of its advanced APT defense solution, FireSphere, with HP's SDN architecture and its SDN VAN controller. This new SDN application, part of the HP SDN App Store, extends FireSphere's perimeter defense capabilities to detect malware once inside the network, then contain the outbreak of the infection, such as the CryptoLocker malware, immediately and automatically.
"There is a gaping hole in organizations' security postures that leaves the network at risk of data exfiltration in the dwell time following infection but before the threat is detected," said Paul Martini, CEO of iboss Cybersecurity. "Assuming you can stop all malware is unrealistic. The FireSphere solution automatically detects when an infection has breached the perimeter then isolates it to mitigate an outbreak and stop the consequences of the infection. We're excited to now make this SDN application available to our customers through HP SDN App Store, and demonstrate iboss' aggressive approach in defending enterprises in this new era of cyber-attacks."
This new application integrates FireSphere's advanced data protection features, including auto-quarantine of infected machines and baselining anomaly detection, with industry standard Open-Flow supporting switches. By directly targeting the switch to which an infected device is attached, FireSphere automatically isolates and blocks any infected machine. Typically, when malware such as the infamous CryptoLocker infects a network, it begins encrypting any shared drives and files it can access, without needing to leave the network. iboss can now immediately contain the spread of such an infection by blocking any communications from the original malware-infected machine. This ultimately reduces data exfiltration and prevents further damage.
"Given the turbulent nature of today's cyber threat landscape, organizations need a simpler way to manage and contain malware that has broken through the network perimeter," said Dominic Wilde, VP of Product Management and Product Marketing at HP Networking. "The integration of FireSphere with HP SDN architecture provides customers with the global visibility into their networks needed to ensure that such threats are contained before they are able to cause further damage to the organization."
The FireSphere Threat Isolator is available now for download through the HP SDN App Store. To learn more about FireSphere Threat Isolator, visit iboss at RSA 2015 on April 20-24 at booth #S2227 in the South Expo hall, or visit: http://www.iboss.com.
About iboss Cybersecurity
iboss Cybersecurity defends today's borderless networks against malware, advanced threats and data exfiltration with innovative Web Security, Mobile Security and FireSphere Advanced APT defense. Unlike legacy technology focused solely on keeping malware out, iboss offers a balanced cybersecurity approach with equal emphasis on prevention, detection and containment to reduce damaging loss from data breaches. Backed by patented, next-generation technology and unparalleled visibility across all inbound/outbound data channels, iboss Smart Defense provides better security weapons to reveal blind spots, detect breaches and minimize the consequences of data exfiltration. Leveraging leading threat protection and unsurpassed usability, iboss is trusted by thousands of organizations and millions of users. Visit www.iboss.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs