Press Release Summary:
With ThreatOptics™, incident response times to Advanced Persistent Threats and malware attacks can be reduced. Software automatically turns threat reports received by Palo Alto Networks’ WildFire service into protection in multi-vendor, large scale environments. Using threat scores, administrators can identify high priority incidents based on severity and malware confidence rating. Reporting capabilities show attacks over time, recurring internal offenders, and frequent sources of attacks.
Original Press Release:
NetCitadel Expands Industry's Only Real-Time Security Threat Management Platform Protecting against Advanced Persistent Threats and Malware Attacks
NetCitadel Adds Palo Alto Networks Support, Data Visualization, and Threat Score Prioritization of Security Events Using Context and Intelligence to Accelerate Response to Next-Generation Threats
SAN FRANCISCO (RSA Conference 2014 Booth 341) — NetCitadel, Inc., the pioneer in innovative threat management solutions, today announced a significant update that expands the analytics capabilities and 3rd party detection support of its ThreatOptics™ threat management platform. This release enhances ThreatOptics’ automated approach to surround detected threats with context and intelligence, thus dramatically reducing incident response times to Advanced Persistent Threats (APTs) and targeted malware attacks. The new capabilities will be demonstrated this week at the RSA Conference 2014 (Booth # 341).
In this latest release, NetCitadel has enhanced ThreatOptics to include:
- Support for Palo Alto Networks’ WildFire service. ThreatOptics will automatically turn threat reports received by WildFire into protection in multi-vendor large scale environments or generate deep threat profiles that enable analysts to make quick decisions on how best to respond.
- Threat Scores. ThreatOptics will enable administrators to identify high priority incidents based on a variety of factors including incident severity, malware confidence rating, number of reporting event sources and more. Threat scoring greatly enhances security analysts’ ability to respond to high volumes of security alerts by automating the investigation process.
- Reporting and Visualization. ThreatOptics adds industry-leading reporting capabilities that provide Incident Response teams with critical trending information such as attacks over time, recurring internal offenders, frequent sources of attacks and more. This type of actionable intelligence enables security teams to make fact-based decisions to continuously improve their security policies and procedures.
NetCitadel customer, RWE Supply & Trading (RWE-ST), a leading European energy-trading firm, describes how they use ThreatOptics to enhance their threat intelligence and accelerate their incident response. “As a global player in the energy trading business, RWE-ST has invested heavily into making sure our infrastructure is secure,” said Dr. Andreas Rohr, Head of Strategic Information Security. “We recognize that a proper security posture is not just about detection, but it also includes an effective analysis and response capability. NetCitadel ThreatOptics provides our Incident Response team with contextualized data for each incident and the ability to contain infections in real-time. Closing the gap between threat detection and rapid response is crucial to our ongoing mission to keep our IT landscape secure.”
“With this new release, NetCitadel ThreatOptics continues to meet the growing needs of CISOs and Incident Response teams,” said Mike Horn, NetCitadel co-founder and CEO. “Without the proper context about detected threats, it is extremely difficult to investigate, mitigate, and contain these attacks in a timely manner. We are excited to continue delivering on our promise of making real-time incident response a reality.”
About NetCitadel ThreatOptics
NetCitadel ThreatOptics provides the industry’s leading threat investigation, mitigation, and containment technology in a threat management platform that leverages intelligent event context and patent-pending security orchestration technologies to deliver real-time responses to security events. Rich sources of security information, from systems such as Security Information and Event Management (SIEM), Advanced Malware Detection (AMD) and Intrusion Detection Systems (IDS), are seamlessly integrated to work with existing security devices, such as firewalls and web proxies. Deployed as a virtual appliance, ThreatOptics leverages security event information and, based on the information in the security event, updates existing security devices to react to those security events in real-time. By using ThreatOptics, organizations can dramatically reduce the time it takes to respond to an identified security event by enabling either a fully automated or semi-automated response. ThreatOptics uses proprietary security intelligence algorithms to help enterprises determine the severity of a security event as well as the appropriate response to that event.
The updated NetCitadel ThreatOptics will be generally available in Q2 2014.
NetCitadel is the pioneer in innovative security threat management. Recognizing the dramatic growth in cyber-attacks and the increase in targeted attacks using Advanced Persistent Threats (APTs), the company identified the need to operationalize the overwhelming volume of security data and turn them into protections. Its threat management platform, ThreatOptics, leverages patent-pending technology to connect existing network security devices with real-time security event information then update protective infrastructure instantly. Headquartered in Mountain View, Calif., the company is venture backed by NEA and other investors. For more information about NetCitadel and its solutions, call (650) 564-4285 or visit http://www.netcitadel.com.
NetCitadel is a registered trademark of NetCitadel in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.