Quantcast
Channel: iTWire - Entertainment
Viewing all articles
Browse latest Browse all 4710

Enterprise threat intelligence as a service (ETIAS)

$
0
0
Enterprise threat intelligence as a service (ETIAS)

It is becoming vital for enterprises to gain threat intelligence from the widest possible range of sources to adapt proactively to the ever-changing security environment. Targeted attacks, advanced persistent threats (APTs), zero days and botnet activities are difficult to discover – you must look outside your company networks.

ESET has announced ETIAS that requires no installation – just a connection to its cloud. Both ESET and non-ESET customers can access it for targeted early warning, botnet activity reports, automated sample analysis and much more.

It is powered by ESET’s more than 100 million worldwide sensors and has advanced levels of machine learning backed by real people.

Jeronimo Varela, Director of Global Sales at ESET, said, “Targeted attacks, advanced persistent threats (APTs), 0-days and botnet activities – it is hard to predict a possible targeted attack or malware campaign with only the information from within the company’s networks. ESET Threat Intelligence provides the comprehensive intelligence ESET possesses to complete the overall security picture, broaden their view and close the gap between the information they have from their own network and global reality.”

{loadposition ray}

ESET Threat Intelligence service offers the following features:

  • Targeted Malware Report: Report based on custom criteria that keeps users informed about potential attacks under preparation or an ongoing attack specifically targeted against their organization.
  • Botnet Activity Report: Delivers regular reporting and quantitative data about the identified malware families and variants of botnet malware which are being monitored as part of ESET Threat Intelligence.
  • Sample Analysis: Users are able to upload files or hashes to generate custom reports.
  • Data Feeds: Data Feeds are designed to integrate into existing Security Information and Event Management (SIEM) systems, providing an additional layer of protection. Data Feed Integration makes it possible, for example, to correlate the logs coming to the SIEM from different network devices with our Data Feeds.
  • Phishing Report: Based on custom criteria, it shows all data about (email) targeted phishing activities for the selected customer.
  • Dashboard: It provides a basic overview what is happening.
  • API Access: Users can connect ESET Threat Intelligence via API with their internal systems.

Viewing all articles
Browse latest Browse all 4710

Trending Articles