Lastline’s integration with PhishMe is a great example of how easy it is for businesses to add advanced malware detection to their existing security tools.
Co-Founder and Chief Scientist of Lastline, Christopher Kruegel, presents with student, Yan Shoshitaishvili, at the 2015 Black Hat Conference.
Co-Founder and Chief Architect of Lastline, Engin Kirda, presents at the 2015 Black Hat Conference in Las Vegas.
Lastline founder and chief architect, Dr. Engin Kirda, discusses new ransomeware research presented as Black Hat 2015.
View this session to learn about recent examples of several classes of evasion techniques observed in the wild and solutions to these challenges, each enabled by full-system emulation.
Lastline Co-founder Engin Kirda presents "Upcoming Challenges in Automated Malware Analysis" to an CISO audience at the NY Information Security Meetup.
Join Lastline and Carbon Black to learn about advanced threats, such as zero-day and targeted attacks, aimed at finding and stealing sensitive information target their attacks on endpoints and servers.
Lastline makes event management easier, you can deal with all the events from a single host while still seeing how these events are related to a higher level infection.
astline provides a comprehensive view of the malware's behavior to date, context within your network and known information from a vast database of threat intelligence.
The "download" and "mail" tabs allow you to look at how many people have downloaded a file, rather than whether a host was infected or a given number of events.
We partner with Carbon Black to provide end-to-end protection against advanced and evasive threats. Watch this demo to see how the integration can accelerate incident response time.
Co-Founder and Chief Technology Officer of Lastline, Giovanni Vigna, presents on the problem of evasive malware at the 2014 IP Expo Conference.
Download the slidedeck for "Now You See Me, Now You Don't: Chasing Evasive Malware" by clicking here.
Watch how Lastline Enterprise lets you quickly drill in and see the specifics of pertinent network compromises without having to look through a large volume of events.
Watch to learn how Lastline binds together the entire attack chain, enabling you to immediately focus on the hosts that require your attention.