Author: Brian Laing

Dell SecureWorks is combining its threat intelligence with the Lastline Breach Detection Platform to bring to market its Advanced Malware Protection and Detection (AMPD) service. With AMPD, the Dell SecureWorks Counter Threat Unit research team can rapidly diagnose and manage advanced threats. The software-based Lastline...

Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions announced yesterday a partnership and technology integration with Lastline that provides customers with the ability to detect and defend against breaches caused by advanced and evasive threats. Tripwire® Enterprise continuously captures, monitors and...

Lastline Knowledge Base of Advanced and Evasive Threats Immediately Accessible and Actionable through Juniper Spotlight Secure Platform The network security innovation leader Juniper Networks will integrate Lastline Advanced Threat Intelligence subscription service with its Spotlight Secure open security intelligence platform. In teaming up with Lastline, Juniper...

Lastline has recently been working with Barracuda Networks to create solutions Barracuda customers can use to fight advanced persistent threats and evasive malware. Here are three ways our technologies now work together. Opportunity Protection Level  Option 1 Interoperate Object Option 2 Co-sell Object and Network Option 3 Co-sell Object and Network   Option 1: Interoperate Barracuda Next-Generation Firewall products...

A walkthrough of event management in the Lastline Enterprise portal. Dealing with individual malware attack events is difficult — you have to look across a sea of events for other hosts on the network. Lastline makes event management easier. You can deal with all the events...

Walkthrough the analysis of downloaded files in the Lastline Enterprise portal. The "download" and "mail" tabs allow you to look at files downloaded by users on your network as an alternative to searching through events. This can be useful in gaining a comprehensive view of behaviors...

Quickly find compromised hosts without having to scour through individual events. Lastline Enterprise exposes the end-to-end attack chain for APTs. By rolling "events" into "incidents" and "incidents" into "network infections", we enable you to focus on the hosts that need immediate attention. This clip is the third...

A quick overview of security event data in the Lastline Enterprise portal. With Lastline Enterprise you can quickly drill in and see the specifics of pertinent network compromises without having to look through a large volume of events or even numerous pieces of network infection information. For...