Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
LAS VEGAS, NV -- (Marketwired) -- 07/29/13 -- Norman Shark, the global security leader in malware analysis solutions for enterprises, service providers and government entities, announced today Malware Analyzer G2 (MAG2) version 4.0, which provides industry-leading hybrid analysis, and Network Threat Discovery version 5.1 (NTD), a cyberattack discovery system that automatically collects and detects malicious files that have slipped past traditional security nodes.
"Norman Shark continues to improve the performance of its MAG2 malware forensic solution, it remains the industry standard for organizations eager for the most comprehensive approach for detecting today's myriad malware threats," said Christophe Birkeland, Norman Shark's chief technology officer. "A single MAG2 v4.0 appliance is capable of analyzing over 50,000 samples per day, meeting the needs of any corporation, utility or government entity."
Demos of Norman Shark's updated MAG2 solution will be available at Black Hat 2013, July 31 and August 1, held at Caesar's Palace, Las Vegas, in booth #321.
Jonathan Camp, senior software developer at Norman Shark, is presenting a special workshop at Black Hat on tools and techniques employed by the perpetrators described in the Hangover report, on Wednesday, July 31 in the Milano Ballroom #8 at Caesar's Palace. Click here to download the full Operation Hangover report.
Updated MAG2 Version 4.0 Supports Windows 8 and 64-bit Windows Operating Systems
With this new release, MAG2 leads the malware forensics market by offering Windows 8 support as well as both 32-bit and 64-bit support for Windows 7 and 8. Embedded in MAG2 is a seventh-generation award-winning Norman SandBox® engine. The engine features significant performance improvements and detection-in-the-wild capabilities over previous versions:
Integrators gain increased ability to design back-end intelligence solutions using MAG2 analysis in a new engine mode designed for advanced OEM applications. "The combination of new platform support, improved performance, increased malware detection capabilities and advanced integration do a better job of meeting and exceeding our customers' needs," commented Michael Rosen, product manager at Norman Shark.
MAG2's new features are also reflected in Norman Shark's Network Threat Discovery system version 5.1. New NTD features facilitate integration with MAG2 to provide a unified solution for IT security teams. These include collective intelligence, where malware data is shared across installations, plus command-and-control server blocking providing the ability to shut down connections to malicious remote servers. A streamlined user interface includes integrated dashboard views, plus easy sorting, searching and incident status monitoring.
About Norman Shark Solutions
Please click here for more information about the Malware Analyzer G2 and its industry-leading Hybrid Analysis that runs suspicious artifacts through the award-winning Norman SandBox® and concurrently analyzes the code in Norman Shark's virtualized IntelliVM modules.
Please click here for information about the Network Threat Discovery system that automatically collects and detects malicious files that have slipped past traditional security nodes.
About Norman Shark
Norman Shark is a global leader and pioneer in proactive network security solutions and forensics malware tools. Norman Shark's proactive antimalware solutions, including malware analysis tools, network security and industrial control system protection, are powered by patented Norman SandBox® technology and used by security solutions providers around the world.
SandBox is a registered trademark of Norman AS. Norman Shark Malware Analyzer G2 and Network Threat Discovery are trademarks of Norman Shark. All other trademarks or registered trademarks are the property of their respective owners.
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs