Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
ROCKVILLE, MD -- (Marketwired) -- 03/03/15 -- Enterprise endpoint security provider Triumfant, today released AtomicEye, the latest version of its endpoint security agent for Windows-based and Mac OS X environments. AtomicEye's central purpose is to ensure that once inside a company's or government agency's systems, no attacker can leave with proprietary information, damage to enterprise systems is minimized, and critical assets are secured. When high-value assets are at risk, instant detection and rapid response is critical. AtomicEye achieves this by continuously scanning more machine assets than any other endpoint security product -- more than 700,000 assets per protected machine.
Cyber criminals are more persistent and creative than ever, corrupting government and corporate IT systems -- resulting in great economic damage to corporations, government agencies, and the global economy. An alarming 95 percent(1) of all U.S. enterprises claim that they are being successfully attacked today. Those same organizations report an average 200 day latency period between when an attack has occurred and when the breach is discovered -- allowing ample time for attackers to extract huge amounts of data as seen with the targeted attacks at Sony, Home Depot and Target.
"I can think of no greater technological failure in the last generation than the inability of the security industry to stop cyber criminals from wreaking havoc on the world's companies and governments -- it's embarrassing," said John Prisco, CEO of Triumfant, Inc. "Companies remain so focused on the perimeter they have little idea of what's going on inside the network and on their machines. Triumfant's AtomicEye operates under the assumption that all of the cyber criminals will succeed in breaching systems and that relying on human oversight, analysis, and action is error prone and unnecessary."
An epidemic is at hand and the magnitude of these security failings requires a completely new approach: one with a greater dependency on immediate detection and automatic remediation based on deep analytics and a sub-atomic view into machine assets and change behaviors.
Triumfant's AtomicEye requires little oversight, offers continuous protection and most importantly, prevents damage, loss and destruction that can cripple a business. AtomicEye secures information on end-point computers and systems in three ways:
"The security industry has tried many approaches to preventing malware over the years, and some have worked better than others. By now, everyone should realize that signature-based approaches have limited value," said Adrian Sanabria, Senior Security Analyst at 451 Research. "Innovations like Triumfant's memory scanning approach are an important and significant step forward in fighting the battle where it occurs -- on the endpoint. Many current technologies address threats directly, taking a single step to prevent an attack. These are easily leapfrogged by the attacker, and have limited long-term value. The industry desperately needs more approaches that address problems at the root, and will force attackers to spend significantly more time and effort to achieve their goals."
AtomicEye is available today. For more information, please see www.triumfant.com
About Triumfant
Triumfant provides continuous protection from advanced malware threats on the endpoint, stopping cyber criminals in their tracks. Offering the most advanced detection capabilities and featuring enhanced memory and Mac features, Triumfant ensures that once inside a company's or government agency's systems, no attacker can leave with proprietary information, damage to enterprise systems is minimized, and critical assets are secured. Triumfant stops a breach before it becomes a full-scale attack then automatically repairs the machine(s) and any collateral damage within minutes -- no human intervention or system downtime is required. When attacks occur, companies and government entities trust Triumfant to quickly recover and prevent loss. Visit www.triumfant.com
(1) Ponemon Institute's 2014 Cost of a Data Breach: Global Analysis.
Media Contact:
April H. Burghardt
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs