Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
ATLANTA, GA -- (Marketwired) -- 05/12/15 -- Vorstack, a leading Threat Intelligence Platform provider for automation, curation and collaboration of threat intelligence to fight cyber threats, today from the National Health Information Sharing & Analysis Center (NH-ISAC) / SANS Annual Healthcare Cyber Security Summit announced it has partnered with Flashpoint, the leading data and software services provider of intelligence from the Deep and Dark Web -- the areas of the Internet that mainstream search engines do not penetrate.
Vorstack has integrated Flashpoint's Deep and Dark Web data into its Threat Intelligence Platform, further enabling customers to understand threats detected on their networks. The joint solution will be available in Vorstack's next release.
"As criminals, hackers and other bad actors engage in illicit activities and coordinate their efforts on the Deep and Dark Web, organizations are finding themselves the targets of harmful actions without warning," said Flashpoint CEO Josh Lefkowitz. "By integrating Flashpoint's data into the Vorstack Threat Intelligence Platform, Vorstack customers now have access to unique and differentiated data offering greater insight into these malicious areas of the Internet and specific threats that need immediate attention."
Flashpoint's structured datasets are cultivated from threatening communities active within the Deep and Dark Web -- from terrorists to cybercriminals. It enables organizations to discover meaningful data in order to understand their adversaries more comprehensively and mitigate looming threats.
"Security breaches are driving organizations to expand the sources of threat data, and Flashpoint's data builds out a unique view of threat intelligence around specific bad actors," said Anne Bonaparte, CEO and President of Vorstack. "We continue to hear from our customers that relevance and context are the most important components of actionable threat intelligence. Vorstack brings the Flashpoint data to life and pinpoints the specific threats that warrant immediate attention based on this robust threat data."
Vorstack delivers actionable threat intelligence by reducing the noise inherent in threat data and enabling secure and controlled information sharing without attribution. The automated curation and correlation of threat data from external sources, behind perimeter defenses, and behind the defenses of trusted organizations, enables organizations to identify relevant threats in minutes instead of months.
About Flashpoint
Flashpoint illuminates the Deep and Dark Web. A pioneer in providing intelligence from these regions of the Internet, Flashpoint's software and data services help companies, governments, and consumers enhance their cyber and physical security. The company's unique blend of subject matter expertise and software engineering has changed the way meaningful and actionable intelligence is gleaned from the previously unmapped regions of the Internet. Flashpoint is backed by TechOperators, Greycroft Partners, K2 Intelligence, Bloomberg Beta, and Cisco Investments. Flashpoint on the Web: Flashpoint-intel.com
Twitter: @FlashpointIntel
About Vorstack
Vorstack provides a Threat Intelligence Platform that automates the process of collecting, analyzing, correlating and securely sharing structured and unstructured machine-readable information on current and emerging cyber threats. The Vorstack Automation and Collaboration Platform dramatically increases operational efficiency by reducing the time it takes enterprises to identify and remediate security threats. Vorstack enables secure and anonymous collaboration and ensures control and protection of shared information. Vorstack reduces discovery time, remediation time, and overall risk to cyber-threats. For more information, visit www.vorstack.com.
Contact:
Dan Spalding
Email Contact
(408) 960-9297
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs