Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
FAIRFAX, VA -- (Marketwired) -- 04/15/15 -- Invincea, Inc., the leader in advanced endpoint threat protection, again redefined endpoint security today by adding extensive new threat identification and response capabilities to its award-winning secure containerization solution. Invincea Advanced Endpoint Protection 5 uniquely combines containerization technology with advanced endpoint visibility, analysis, and control to provide superior compromise detection and elimination. Most notably, the solution identifies suspicious software processes and applies cloud-based analytics to identify previously unknown compromises.
According to Gartner, Inc., "A detection and response-only strategy is as flawed as a prevention-only strategy. The best future endpoint protection will be provided by endpoint platforms that are capable of providing preventive, detective, responsive and predictive capabilities in an integrated solution." [1] Today, Invincea Advanced Endpoint Protection 5 becomes the first unified advanced threat protection solution to contain targeted attacks, identify existing compromises and re-establish control by eradicating malware -- all with a single small-footprint integrated agent.
Already trusted by more than 25,000 customers globally, Invincea is an established leader in defeating attack vectors through which most breaches occur -- employees clicking on malicious links, visiting compromised websites or opening weaponized documents -- all of which regularly evade conventional security controls. The addition of new sensor technology, which works in concert with its cloud-based cyber genome analysis technology, called Cynomix, enables security teams to identify compromised devices that previously evaded detection. Invincea Advanced Endpoint Protection now includes granular escalating controls that empower security staff to isolate suspect processes on endpoints, quarantine compromised devices, and eradicate threats enterprise-wide. Invincea Management, which runs cloud-hosted or on-premise, manages endpoints and allows security teams to selectively publish threats to trusted communities in standard STIX format. As a result, enterprises can dramatically reduce compromise, gain visibility into compromised devices, and regain control over the network to limit adversary movement and damage.
"We chose Invincea to protect our bank against targeted attacks on our employees, including spear-phishing and web-based drive-by attacks. Our enterprise deployment of Invincea has greatly reduced our end user risk exposure," said Christopher Walsh, FVP and Information Security Officer, Bank Leumi. "Invincea is a key element of our information security strategy, and we estimate it has delivered millions of dollars of value to the bank. Now we are excited to gain full visibility and control over our endpoints with the release of Invincea Advanced Endpoint Protection."
"Working together, Invincea and Dell are successfully protecting end users and enterprises of all sizes from zero-day exploits and other targeted attacks with the Dell Data Protection | Protected Workspace solution," said Brett Hansen, executive director, client solutions security and management at Dell. "The release of Invincea's new detection and response capabilities demonstrates Invincea's commitment to innovation and will help ensure Dell continues providing the most secure commercial endpoints in the industry."
Comprised of Invincea Endpoint (formerly Invincea FreeSpace), Invincea Management (formerly Invincea Management Server) and Cynomix, Invincea Advanced Endpoint Protection 5 includes groundbreaking capabilities:
"Endpoints are perennially at risk of opening the door to devastating breaches," said Anup Ghosh, founder and CEO of Invincea. "Traditional endpoint security products contribute to the problem through end user productivity loss and ineffective security. Recent headlines underscore the need to evolve from the reactive paradigm of Prevent, Detect, and Respond to the proactive posture of Contain, Identify, and Control. Invincea Advanced Endpoint Protection is the answer to that challenge."
Availability and Pricing
Invincea Endpoint 5.0, Invincea Management 3.0, and Cynomix are available immediately. Invincea Endpoint is priced per protected machine and Invincea Management is priced per server instance. Integrated access to Cynomix is included with Invincea Management at no additional cost.
[1] Gartner Market Guide for Endpoint Detection and Response Solutions, Peter Firstbrook and Neil MacDonald, 13 May 2014
Follow Invincea:
Invincea Blog: http://www.invincea.com/knowledge-center/blogs/
Webinar Series: http://www.invincea.com/upcoming-webinars/
Facebook: https://www.facebook.com/InvinceaInc
LinkedIn: https://www.linkedin.com/company/929463
Twitter: @Invincea
About Invincea, Inc.
Invincea is the leader in advanced endpoint threat protection for enterprises worldwide. The company provides the most comprehensive solution to contain, identify, and control the advanced attacks that evade legacy security controls. Invincea protects enterprises against targeted threats including spear-phishing and Web drive-by attacks that exploit Java, Flash, and other applications. Combining the visibility and control of an endpoint solution with the intelligence of cloud analysis, Invincea provides the only market-deployed solution that defends against 0-day exploits, file-less malware, and previously unknown malware. The company is venture capital-backed and based in Fairfax, VA. For more information, visit http://www.invincea.com.
Contact:
CHEN PR for Invincea
Jennifer Torode
Email Contact
781-672-3119
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs