Lastline Unveils Unprecedented Breach Protection Capabilities
Lastline Breach Defender is the only solution that provides a dynamic blueprint of a breach as it unfolds in a network
REDWOOD CITY, CA – July 20, 2017 – Lastline, Inc., the leader in advanced network-based malware protection, today introduced Lastline Breach Defender™, the industry’s only solution that provides a dynamic blueprint of a breach as it unfolds and moves laterally across a network. Informed by unprecedented understanding of malware behaviors, Lastline Breach Defender provides the visibility, context, threat intelligence, and integration enterprise security teams need to remediate breaches faster, with fewer resources, and at lower cost.
“When malware strikes, it is imperative that security teams see and understand all the malicious activity taking place across a compromised network,” said Christopher Kruegel, Lastline CEO. “Lastline Breach Defender provides this information, accelerating the team’s ability to respond to a breach before data exfiltration can occur by identifying all the applications, systems, and data affected by the malware.”
Features of Lastline Breach Defender include:
Collection & Augmentation
- Malware Detection: Lastline Deep Content Inspection™ detects attacks that evade sandboxes, firewalls, and other “next-gen” tools by uncovering malicious behavior engineered into a piece of malware with unique fidelity not possible with other technologies.
- Network Analysis: Monitors events and network activity, including low-level events and seemingly benign activity, to uncover all malicious network activity.
- Global Threat Intelligence: Provides context by linking activity within a network with global information about threats previously detected by Lastline’s global customer base.
- Integrations: Proven integration with third-party security products further inform breach analysis and improve effectiveness of existing controls.
- Data Correlation: Applies machine learning and AI techniques to connect collected data and identify relationships among seemingly unrelated aspects of the breach activity, spotting elements of a breach that otherwise would have been missed with limited security staffing and other tools.
- Anomaly Detection: Builds a profile of normal network activity using machine learning, and correlates anomalies in the context of detected breaches, providing improved threat analytics without overwhelming analysts with benign anomalies.
- Manual or automated response enables an organization to implement mitigating controls to help secure their organization.
- Integrations with existing security infrastructure improve the effectiveness of current security products, staff, and processes.
- Cloud-based architecture and flexible deployment options reduce the cost and complexity of eliminating advanced threats.
“Lastline provides unmatched breach detection with a single product that correlates network anomalies, threat intelligence, and our deep visibility of malware behavior,” said Brian Laing, Lastline VP of business development and products. “Lastline Breach Defender provides all the capabilities enterprises need to detect breaches quickly with minimal false positives, remediate them more efficiently and effectively, and do so with fewer resources, protecting the organization from costly and damaging data breaches.”
Lastline Breach Defender is the latest addition to Lastline’s family of products, widely acknowledged as the industry’s most effective advanced threat detection and protection solutions. For more information, visit www.lastline.com.
Lastline provides breach protection products that are innovating the way companies defend against advanced malware. We deliver the visibility, context, analysis, and integrations enterprise security teams need to quickly and completely eradicate malware-based threats before a damaging and costly data breach occurs. Headquartered in Redwood City, California with offices throughout North America, Europe and Asia, Lastline’s technology is used by Global 5000 enterprises, is offered directly and through resellers and security service providers, and is integrated into leading third-party security technologies worldwide. www.lastline.com
Latest posts by Lastline (see all)
- 3 attacks you’d miss without AI - June 17, 2019
- Security Awareness Training Without Tech Awareness Can Leave Employees in the Dark - June 5, 2019
- Medical Debt Collector Breach Highlights Supply Chain Dangers - June 4, 2019