INGATE

From The Sip Trunking Experts

TMCNet:  GFI Software Announces ThreatTrack 2.0 to Plug Malware Holes in Real-Time

[January 17, 2013]

GFI Software Announces ThreatTrack 2.0 to Plug Malware Holes in Real-Time

CLEARWATER, Fla., Jan. 17, 2013 /PRNewswire via COMTEX/ -- Today GFI Software(TM) announced the launch of GFI ThreatTrack(TM) 2.0, the latest version of the company's proven security intelligence solution that provides users with deep visibility into the threat landscape. A culmination of information collected from GFI SandBox(TM), GFI's automated malware analysis tool, and the company's extensive partnerships with security organizations worldwide and the company's own malware research professionals, ThreatTrack 2.0 produces a range of data streams containing more than 69 million malicious URLs, IP addresses and other malware samples.


(Logo: http://photos.prnewswire.com/prnh/20121204/MM23629LOGO) ThreatTrack users rely on this actionable intelligence to play an important part in their efforts to stop malicious websites, emails and other Internet traffic before they can put corporate networks at risk. For example, security integrators and in-house IT security teams integrate ThreatTrack data streams into their security infrastructure to strengthen firewall filtering and third-party proxy solutions, and to respond to emerging threats faster than ever before. Security vendors leverage ThreatTrack to populate their malware reputation database with the latest threats in order to better defend their customers. Additionally, academic researchers use ThreatTrack's data to predict and track malware, and thus, assist the IT security community in their efforts to combat cybercrime.

"When you are up against sophisticated cybercriminals, every minute counts," said Julian Waits, general manager of GFI Software's Security Business Unit. "Zero-day malware threats are much harder for security systems to detect than known malicious files that are already blacklisted. The security industry and the academic world work together closely to analyze new and evolving malware samples and identify ways to stop these threats before they can infect enterprise networks. ThreatTrack can be an invaluable part of this process, as it provides the real-time intelligence needed to combat malware as cybercriminals look for new backdoor vulnerabilities to target." The latest version of ThreatTrack provides users with up to seven times the data available in version 1.0. Users can now also access the powerful data they have come to rely on to catch malware threats quicker and easier than ever before - which can mean the difference between suffering a breach or remaining secure. Additional benefits of ThreatTrack 2.0 include: -- Increased Accessibility - Previously available through a file transfer protocol (FTP) site, ThreatTrack 2.0 data streams are now accessible via a REST API, providing customers with direct, real-time access to continuously updated information. Users no longer have to struggle with large FTP downloads to get their hands on malware data essential to their organization.

-- Real-Time Accessibility - ThreatTrack 2.0 data streams are updated in near real-time to provide customers with immediate access to information about the latest malware threats.

-- Enhanced Customization - Through the REST API, customers can now also tailor data retrieval to their own personal needs. They can customize the type and amount of data they download to ensure they are analyzing only the information that is pertinent to their organization.

-- Flexible Formatting - Users can now select from XML, JSON or TXT formatting options so data streams are easily integrated into their products.

GFI ThreatTrack 2.0 is available now. The ThreatTrack Intelligent Monitoring Essentials Suite is comprised of three real-time data streams encompassing the most critical threat intelligence for defending enterprise networks: the Malicious HTTP Block, Suspicious HTTP Alert and Malicious HTTP Phishing streams. ThreatTrack Essentials Suite customers looking for more in-depth intelligence can choose from four powerful add-ons: Dynamic Behavioral Analysis, Border Patrol, Malware Executable Repository and Malware Traffic streams. To learn more about ThreatTrack 2.0, visit www.gfi.com, send an email to ATG@gfi.com or call 855-443-4284.

About GFIGFI Software provides web and mail security, archiving and fax, networking and security software and hosted IT solutions for small to medium-sized businesses (SMB) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMBs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States, UK, Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold ISV Partner.

For more informationGFI SoftwarePlease email David Kelleher at David.Kelleher@gfi.com GFI - Malta: Tel: +356 2205 2000; Fax: +356 21382419URL: http://www.gfi.com Davies Murphy GroupPlease email Brian Alberti at gfi@daviesmurphy.com GFI - U.S.: Tel: +1-781-418-2403 DisclaimerCopyright © 2013 GFI Software. All rights reserved. All other trademarks are the property of their respective owners. To the best of our knowledge, all details were correct at the time of publishing; this information is subject to change without notice SOURCE GFI Software

[ Back To SIP Trunking Home's Homepage ]

Loading
Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner


Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Making A Broadband Purchase Decision
Businesses today have many options for broadband connectivity. Clarifying your particular business needs prior to selecting a broadband provider will ensure an optimal match of broadband service to your requirements.

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Case Studies

Business Telecom Expenses Reduced 50%
A small to medium sized company in the midwest was interested in migrating to IP Communications, but in today's economy, they were hesitant to upgrade their communication system due to their perception that the cost would outweigh the benefits.

Multi-State Company Cuts Telecom Costs 50%
A multi-site, multi-state company with extensive monthly long distance fees and toll-free charges did not have adequate broadband for Broadvox SIP Trunking requirements, nor did they have a SIP enabled telephone system.

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?ces all over the country, the company spent a great deal of money every month just on internal phone calls.

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

Broadvox VAR Testimonial VAR 1:
Part 1 of the VAR (Value Added Reseller) Partner Program Testimonials for Broadvox...

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

Partner Program Overview:
Over 4,000 VARs, Master Agents, Solution Providers, and Independent IT Professionals trust Broadvox. We offer customized services and solutions to fit seamlessly into any company's business model. And when you partner with Broadvox, every member of our team stands behind you and your customers 100%...

SIP Trunk UC Summit

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.