SurfControl plc is a world leading Internet Security company delivering multiple layers of threat protection to shield organizations against complex blended threats
To protect your enterprise from the new generation of blended threats
, you need to take a look at the security strategies you currently have in place.
In contrast, Sadmind, a blended threat
, defaced thousands of Web sites.
emails often employ social engineering techniques and clever designs to lure recipients into clicking on the link that then triggers the infection.
Marshal8e6, a global provider of Secure Web Gateway and email security products, today announced its plans to integrate blended threat
detection from newly-acquired Avinti into a new Blended Threat
Module[TM] for MailMarshal SMTP and the R3000, the company's email and Internet filtering gateways.
Acquisition Supports Company's Email and Web Security Strategy to Deliver Integrated Protection against Blended Threats
NEWT is Avinti's plug-in filter that runs on the most popular MTAs (Mail Transfer Agents) and leverages the power of Avinti's iSolation Server to stop blended threat
However, because this comes through as a blended threat
e-mail, it will completely bypass AV products because there is no attached file to scan.
Nevis Solution: The company's LANenforcer systems apply advanced anomaly detection capabilities to continuously detect and mitigate virus, worm and blended threat
outbreaks such as the Storm Worm to persistently protect customers.
Viruses, worms, Trojan horses, zombies, distributed denial-of-service attacks, hacking, blended threats
are all out there, and many can hitch rides with e-mails, downloads and electronic transmissions, including instant messages.
SurfControl protects enterprises from blended threats
by offering protection for web, e-mail, instant messaging, peer-to-peer and mobile computing through its SurfControl Adaptive Threat Intelligence Service.
The architecture protects against intrusions and malicious code, network infrastructure attacks, application exploits, scans, probes, denial-of-service attempts, backdoors, buffer overflow attempts and blended threats
, like MS Blaster and SQL Slammer.