![]() ![]() For example, healthcare and financial services do not allow de-encryption of SSL-related traffic. As a result, ADCs must often de-encrypt SSL data while also meeting legal compliance requirements in industry segments with data privacy and data encryption rules. However, clear text is required for deep packet inspection and for detecting the session IDs, cookies and URLs needed for intelligent application routing, filtering and server persistency. Today, SSL data encryption is frequently deployed to secure mission-critical and sensitive data over the internet. This partnership will further distinguish Array Networks as a leader in the application delivery controller (ADC) landscape, providing an even higher level of security for its line of purpose-built ADCs and network functions platforms. 26, 2017 – Array Networks Inc., the network functions platform company, today announced a partnership with Webroot to incorporate BrightCloud® Threat Intelligence Services into its platform. With BrightCloud Streaming Malware Detection, OPSWAT’s customers will benefit from faster and more accurate detection of threats at the network perimeter.”įor a complete list of engines see our documentation page.Partnership leverages advanced threat intelligence and automated machine learning to provide web classification for Array ADCs “We’re excited to work with a forward-looking organization like OPSWAT that understands static and list-based solutions are a thing of the past. “Webroot BrightCloud Streaming Malware Detection helps businesses catch malicious files in transit before they enter the network and have the chance to spread the solution utilizes machine learning for reliable, real-time protection that is over 500 times faster than traditional, signature-based solutions. "With the uptick of polymorphic malware, it’s critical that technology providers have reliable, up-to-date threat intelligence,” said Hal Lonas, SVP and CTO for Webroot, an OpenText company. We collect data from many different online sources to offer a service for exposing compromised or malicious addresses.īy integrating Webroot BrightCloud® Web Classification and Web Reputation services and Webroot BrightCloud® IP reputation service, MetaDefender Cloud now provides better detection rates by embedding a dynamic data set of millions of high-risk IP addresses, to protect users from inbound traffic from malicious IPs. MetaDefender Cloud offers users the capability of searching for known malicious IPs, Domains, and URLs as part of the Reputation API. For more details please visit the dedicated licensing page. Commercial users can now benefit from advanced malware detection capabilities from 24 anti-malware engines when opting for our cloud solution. Streaming Malware Detection is already available on MetaDefender Cloud in both free and commercial packages. Read more about packages and custom engines on our licensing page. With advanced malware detection of polymorphic malware and zero-day exploits, the service can detect malware before it infiltrates a network, enabling users to block the files or route for further investigation.įor our on-premises solution, MetaDefender Core, the service is available as a custom engine and can be added on top of any package for enhanced malware detection. Streaming Malware Detection service is now part of OPSWAT's Multiscanning technology, available both in the cloud and on-premises. Webroot BrightCloud® Streaming Malware Detection Service Their products combat today’s most complex cybersecurity challenges and are constantly anticipating how to extend the value of threat identification, prediction, and remediation to the connected world. ![]() Webroot, an OpenText subsidiary, is an internet security company serving consumers and businesses. ![]() Today, we are happy to announce we have partnered with Webroot to enhance our security offering for Multiscanning and IP-Domain analysis. At OPSWAT, we are working hard on building state-of-the-art security products that organizations can rely on for protection against a wide variety of threats. ![]()
0 Comments
Leave a Reply. |