Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MILPITAS, CA -- (Marketwire) -- 09/13/12 -- FireEye®, Inc., the leader in stopping advanced cyber attacks, and Splunk Inc. (NASDAQ: SPLK), the leading provider of software for real-time operational intelligence, today announced the availability of the Splunk® for FireEye application. Information on inbound and outbound events from FireEye appliances is now available within the Splunk Enterprise console.
With this application, Splunk Enterprise provides real-time continuous monitoring and trending of FireEye customer data, along with support for real-time alerting. This allows users to visualize and express long-term trends that aid with the prioritization of incident response activities, as well as set and monitor key performance metrics.
"With our next-generation threat protection, critical information gleaned from our appliance is crucial for security professionals to make informed decisions," said Ashar Aziz, FireEye founder and CEO. "This application is a win for our joint customers by saving them time and increasing their visibility into their security operations."
"Enterprises demand tools that give them insight into events as they occur. FireEye is a leader in providing dynamic analysis and blocking of zero-day attacks," said Bill Gaylord, senior vice president of business development at Splunk. "There is an incredible amount of security data generated by FireEye's products that companies can use to improve their security posture. Splunk software can ingest a comprehensive analysis of malware to ultimately provide security professionals the ability to correlate this data with other activity in their environment to proactively monitor for and detect these elusive threats."
The Splunk for FireEye application provides comprehensive reports for monitoring malware distribution and callbacks, infection types over time, and the number of infected systems. Included in the reports are dashboards that show the number of inbound infections by host IP over time and the number of callbacks over time by malware name. Users are able to examine a discovered piece of malware in a number of ways, including:
Visit www.fireeye.com for more information on FireEye next-generation threat protection.
About FireEye, Inc.
FireEye is the leader in stopping advanced cyber attacks that use advanced malware, zero-day exploits, and APT tactics. The FireEye solutions supplement traditional and next-generation firewalls, IPS, anti-virus, and gateways, which cannot stop advanced threats, leaving security holes in networks. FireEye offers the industry's only solution that detects and blocks attacks across both Web and email threat vectors as well as latent malware resident on file shares. It addresses all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis to detect zero-day threats. Based in Milpitas, California, FireEye is backed by premier financial partners including Sequoia Capital, Norwest Venture Partners, and Juniper Networks.
About Splunk Inc.
Splunk Inc. (NASDAQ: SPLK) provides the engine for machine data. Splunk® software collects, indexes and harnesses the machine-generated big data coming from the websites, applications, servers, networks and mobile devices that power business. Splunk software enables organizations to monitor, search, analyze, visualize and act on massive streams of real-time and historical machine data. More than 4,400 enterprises, universities, government agencies and service providers in over 80 countries use Splunk Enterprise to gain operational intelligence that deepens business and customer understanding, improves service and uptime, reduces cost and mitigates cyber-security risk.
FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Media Contact
FireEye
Lisa Matichak
+1.408.321.6300
Email Contact
LEWIS Pulse
Katherine Nellums
+1.415.432.2451
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs