Partners Tag

End-to-end malware analysis helps provide protection from infected objects residing on or flowing from all applications (email, websites, mobile, etc.) and all endpoint device types (Windows, Mac OS X, Android, iOS). Lastline’s proven integration with Carbon Black is assisting numerous organizations with realizing this important...

It takes multiple cyber-defense and reporting platforms to create an effective, unified front against today’s online threats. No single product suite or one vendor can supply best-in-class protection from the network core to enterprise endpoints. However, the security team that stands the best chance of...

Dell SecureWorks is combining its threat intelligence with the Lastline Breach Detection Platform to bring to market its Advanced Malware Protection and Detection (AMPD) service. With AMPD, the Dell SecureWorks Counter Threat Unit research team can rapidly diagnose and manage advanced threats. The software-based Lastline...

Blue Coat Systems, Inc., a security market leader providing an array of technologies, products, and services, has partnered with Lastline to provide a joint advanced malware analysis solution to enterprise customers. By integrating analysis capabilities from Lastline’s Breach Detection Platform with Blue Coat’s Security Analytics Platform, security professionals can detect...

Lastline Knowledge Base of Advanced and Evasive Threats Immediately Accessible and Actionable through Juniper Spotlight Secure Platform The network security innovation leader Juniper Networks will integrate Lastline Advanced Threat Intelligence subscription service with its Spotlight Secure open security intelligence platform. In teaming up with Lastline, Juniper...

Lastline is proud to power WatchGuard APT Blocker, which is currently available in WatchGuard UTM (Unified Threat Management) and NGFW (Next Generation Firewall) appliances. Here is how this joint solution works: WatchGuard UTM and NGFW products extract suspicious objects (ex. PDF or Word attachments) from the network,...

The threat landscape has changed drastically as a result of rapid technological developments – leading to an ever-changing list of cyber security challenges across every vertical and within businesses of all sizes. With cyber attack methods being enhanced to blind-side current and traditional security systems,...