Version 3.0 of the Cyphort Advanced Threat Defense Platform Accelerates Response Times by Automating Threat Risk Assessment and Remediation

SANTA CLARA, CA--(Marketwired - Jun 24, 2014) - Cyphort, a pioneer of Advanced Threat Defense (ATD) solutions, today announced the General Availability of Version 3.0 of the Cyphort Advanced Threat Defense Platform. Delivering the first Advanced Threat Defense solution able to automatically prioritize threats based on business risk, Version 3.0's Advanced Threat classification and prioritization capability automatically analyzes and ranks threats based on progression, severity and relevance, and presents that data via an intuitive, visual interface. Built-in integration with Blue Coat and Palo Alto Networks leverages Cyphort's open API-driven architecture, allowing customers to dynamically address newly discovered advanced threats/zero day malware by pushing out preventative actions across their environment quickly and with full governance. By defining what "business context" means for Advanced Threat Defense and centralizing threat detection and response from a single platform, Version 3.0 highlights Cyphort's ability to deliver an Advanced Threat Defense platform that overcomes the limitations of first generation solutions.

"As we move to a 100% Cloud infrastructure and a Zero Trust Campus Network, we need to have a distributed advanced threat protection solution deployed across the entire network, and can't afford to be limited by inline appliances," said Mike D. Kail, Vice President of Operations for Netflix. "Cyphort's software-based approach enables us to secure our "elastic perimeter'' and provided the deepest insight and richest analytics of all the solutions we tested."

Earlier this year, Cyphort launched the Cyphort Advanced Threat Defense Platform to great industry acclaim. Its solution, which in the past four months has received honors from RSA Conference, Network World, and Info Security Products Guide, delivers better detection, context-based threat assessment and automated mitigation and enforcement, enabling organizations to lower the cost of protecting against advanced attacks while expediting their time to resolution.

Enhancements to Version 3.0 include:

  • Threat Metric Modeling: Cyphort's new Threat Metrics places threats in context by ranking them by:

    • Threat Severity - not all threats should be treated equal, and with Cyphort's proprietary threat classification engine, each threat is given a severity based on behavior and purpose of malware.

    • Progression: Unique to each threat, Cyphort identifies which milestones within the kill chain have been detected, correlating multiple phases of a single threat into a single incident, dramatically reducing the workload and alert fatigue experienced with 1st generation ATD solutions.

    • Relevance: Based on multiple aspects including whether the virus scanners of the target host(s) potentially recognized / blocked that threat, whether the Operating System or environment was susceptible to the threat, and the overall value of the target relative to the business.

  • Threat View Dashboard: Cyphort's new Threat View Dashboard presents Threat Metric information visually in an intuitive way that allows security teams to quickly identify which threats present the biggest risk to the organization requiring immediate attention and which threats may be safely de-prioritized. By rapidly identifying the most significant threats, Cyphort customers can address the issues that may cause the most damage.

  • Infrastructure-Mitigation with Palo Alto Network's Next Generation Firewall and Bluecoat ProxySG: When the Cyphort Advanced Threat Defense platform identifies a threat, administrators are given the ability to use the mitigation feature to push threat intelligence to Palo Alto or Bluecoat devices in order to update existing blocking rules or other policies. Administrators can selectively add or remove threat data to the Palo Alto Networks or Blue Coat perimeter infrastructure equipment ensuring protection for all internal users. Using the customer's existing infrastructure to provide blocking simplifies deployment, and shortens time-to-mitigation for identified threats on an ongoing basis.