SINET Innovation Summit — July 17 in NYC

logo_sub

Triumfant CEO John Prisco is on the road again, speaking this week at the SINET Innovation Summit 2014 in New York City on July 17, 2014. Supported by the US Department of Homeland Security Science & Technology Directorate, the event connects Wall Street, Silicon Valley and the Beltway, bringing cyber security experts and business leaders together for the one-day event.

John will be a featured panelist during the 1:10 p.m. session “Big Data Solutions Rely on Security Analytics for Actionable Information Risk Intelligence,” moderated by L. William Varner, President, Cyber& Intelligence Solutions Group, ManTech International Corp. The panel will explore the processes and analytics that can better enable next-gen protection mechanisms and the landscape of existing limitations and current advances. Panelists will share real-world experiences and use cases describing successes that have been mounted when security operations teams are enabled with the right approach and not just the right tools.

We hope to see you at the event!

Triumfant Unveils its New Mac Agent at Gartner Security & Risk Management Summit

mac-osTriumfant is pleased to unveil its new Mac agent today at the Gartner Security & Risk Management Summit. Complementing our existing Windows agent, Mac OS users can now benefit from the same reliable, advanced threat detection and rapid remediation software on the endpoint.

Apple continues to achieve significant sales in terms of Mac units sold each year, a trend that is also making inroads with corporate users. In the last decade, the company has increased sales by more than 15 million new units sold per year. The popularity and volume of Mac devices in the enterprise makes it a prime target for cyber criminals looking for mass exploit.  Most security teams can’t detect or react fast enough to these inevitable threats. They need continuous protection and intelligent, real-time analytics and precision-remediation capabilities that provide a comprehensive view of the endpoint population, detect change and respond with accuracy and speed to anomalous activities.

Today’s announcement illustrates how Triumfant has evolved its solution to ensure all systems, including Mac, are able to reap the benefits of our reliable, patented approach to threat detection and remediation, and the first solution to offer a memory process scanner for attacks occurring in a computer’s Random Access Memory (RAM).

Triumfant’s support for Mac OS provides a clear and accurate view into the security posture of an organization and closes the gaps left by firewall, antivirus and sandbox technologies. Triumfant’s self-learning technology is a sound investment for organizations running Mac or Windows. It continuously evolves to keep ahead of next-generation threats and malicious attacks – reducing the costs associated with data loss, effectively managing risk and improving the overall security of any business.

We will be showcasing the new Mac agent today in booth #1101.  For more information about the Triumfant Mac agent, or to schedule one-on-one time with Triumfant at the Gartner Security & Risk Management Summit, please visit: http://bit.ly/1lwXf00.

 

 

Join Us at the Gartner Security & Risk Management Summit

The Gartner Security & Risk Management Summit is just around the corner, June 23-26 in Triumfant’s backyard — National Harbor, MD.  As one of the industry’s most exclusive events, we’re pleased to be a part of the annual gathering and exhibition.  Touted as  helping CISOs and security professionals balance security and opportunity and guide the enterprise quest for risk mitigation, Triumfant will be there to demonstrate its unrivaled approach to advanced threat detection and rapid remediation on the endpoint.

The cost of security intrusions are escalating year-over-year.  The average cost of a data breach is $3.5 million, up 15% from a year ago according to Ponemon Institute’s 2014 Cost of a Data Breach Global Analysis.  As security departments remain short staffed, and traditional signature-based defenses continue to let advanced malware through, companies need Triumfant to know, with certainty, that an attack has happened and to swiftly patch, isolate or remediate the infected machine — in just minutes, without any disruption to the business.

We’re pleased that Gartner agrees, including Triumfant as one of the vendors named in the “Market Guide for Endpoint Detection and Response Solutions” published May 13, 2014 by analysts Peter Firstbrook and Neil MacDonald. 

If you’re a large enterprise struggling to keep ahead of advanced threats and quickly prevent loss when inevitable attacks happen, we’d encourage you to stop by the Triumfant booth or schedule one-on-one time with executives during the show by visiting the landing page here:

Watch for product news from Triumfant coming out of the show — follow @Triumfant and #GartnerSEC

 

 

Top 10 Reasons to Attend the Cyber Security Summit on June 5

CyberSummit_DC_Header_EventbriteLooking for reasons to attend the DC metro area’s premier security conference?  Look no further.

  1. Triumfant is a platinum sponsor of the event. http://cybersummitusa.com/agenda_dc/
  2. You will learn from the nation’s leading experts on how to protect your business from cyber attacks.
  3. Cutting-edge solution providers like Triumfant will demonstrate how to protect your enterprise from malicious attacks.
  4. Network and socialize with an audience of well respected, security professionals.
  5. Get educated on the current and emerging cyber threats that your business will face.
  6. It’s been said that investing one day at the Cyber Security Summit may save you and your company millions of dollars in losses due to cyber crime.
  7. This is a rare opportunity to engage one on one with the intelligence industry and with Triumfant executives in their designated booth area.
  8. The New York Times, Twitter, Chase Bank and thousands of other businesses were attacked in 2013.  Don’t be next?
  9. Cyber crime is the fastest growing threat to businesses globally.  Learn how to secure your infrastructure and its endpoints before it’s too late.
  10. Triumfant’s CEO John Prisco to be a featured speaker on the 2:45 p.m. panel talk on Cyber Policy

We hope to see you at the event!

What Does Symantec Have in Common with Weekend at Bernie’s? Both Have Been Carrying Dead Weight Around

Image

Antivirus is dead, according to the company that invented it. Symantec this week said it was is discontinuing its 25-year-old anti-malware product because it doesn’t work. Triumfant and other security visionaries have known for years that antivirus is dead and that rapid detection and response is the new prevention.  Adversaries are skillfully constructing targeted attacks that purposefully evade traditional endpoint detection solutions. The reality is organizations will be breached, most aren’t  prepared, and the adversary is winning.

Much like the plot of the popular 80’s dark comedy, Weekend at Bernie’s,  Symantec has been carrying antivirus dead weight around for years, attempting to push a product that doesn’t work and can’t keep up with the times.  Declining revenues and CEO turnover, Symantec has been shamed into acknowledging that their antivirus legacy is no longer viable and that a corporate pivot and turnaround is critical.  “We don’t think of antivirus as a moneymaker in any way,” Symantec’s senior vice president for information security told The Wall Street Journal

Time will tell if Symantec can unload its dead weight and reinvent itself with new solutions for rapid detection and remediation that are as technically ambitious as existing vendors on the market.  To technically catch up to pure endpoint security firms like Triumfant, that can detect, minimize and contain the damage of an attack.  Who’s proven technology is already being used by government, media and financial institutions to detect breaches in real-time at the point of infiltration, generate a comprehensive and actionable analysis within minutes of the attack, and build a situational remediation that stops the breach and repairs all of the primary and collateral damage to the machine within five minutes.

See-And-Be-Seen: Triumfant’s CEO John Prisco to Present at Upcoming DC-Area Cyber Security Events

It’s a busy Spring season with several industry and regional events on the docket.  As a prominent security professional and head of one of DC’s fastest-growing security vendors, John Prisco has been invited to participate as a featured panelist at several upcoming events to take place in the region and on the national stage. 

First up is the FS-ISAC Annual Summit taking place this week on Amelia Island in Florida. The event is the only security conference created by members for members to present the latest information on cyber security related threats, trends, and technology.  John will demonstrate how to stop memory-based attacks before they become persistent during the event’s Solutions Showcases to the nearly 500 industry executives and practitioners anticipated to be in attendance.

On May 22, the CyberMontgomery event will take place at the Universities of Shady Grove (USG) Conference Center in Rockville, Md.  CyberMontgomery Forum events examine cyber security as a major growth engine for Montgomery County and how to bring together federal government, industry and academic  assets so that they can coalesce and elevate the cyber ecosystem to a level of national prominence.  John will participate in the Innovative Cyber Solutions from Montgomery County portion of the event.

At the invitation-only Breakfast Discussion on Continuous Monitoring on June 4 at the Ronald Reagan Center, John will join executives from IDC, Websense and SMS to discuss the Office of Management and Budget (OMB) security mandate 14-3 requiring compliance by 2017. The panel will address challenges and confusion around the implementation and discuss the technologies, best practices and services that can support a successful deployment.

During The Wall Street Journal’s DC Metro Security Summit, June 5 at the Sheraton in Tyson’s Corner, John will lend his experience and expert commentary to the panel on cyber policy.  Establishing a cohesive national cyber-security initiative has become one of the major emerging security challenges of the new century.  This panel will analyze the ongoing debate surrounding the implementation and enforcement of strategies, policies and emerging areas of enterprise security architecture that will govern people and information in the years ahead.

We hope to see you there!

 

The Verizon 2014 Data Breach Investigations Report is Out

This week Verizon issued the findings of its annual Data Breach Investigations Report (DBIR).  To no surprise, after analyzing 10 years of data researchers shared: “we realize most organizations cannot keep up with cybercrime — and the bad guys are winning. But by applying big data analytics to security risk management, we can begin to bend the curve and combat cybercrime more effectively and strategically.”  We at Triumfant couldn’t agree more.

Triumfant’s big data and patented analytics approach to breach detection is rooted in its ability to continuously scan more than 500,000 granular state attributes on every machine. This scan is truly continuous – not weekly, monthly or quarterly. Triumfant collects and maintains the most comprehensive repository of state data available, providing organizations a clear, complete, and current view of the endpoint population. Triumfant can then detect and evaluate alterations to the machine to identify changes that are anomalous in the context of the population. The raw state data is translated into real, actionable information about the configuration and health of every machine.  As a result, organizations can identify machines that are open to exploit because of newly identified vulnerabilities or machines that are non-compliant to configuration and regulatory policies.  Triumfant can also pinpoint missing patches on a given machine where infiltration can occur. 

The 2014 Verizon DBIR identified nine basic threat patterns that make up 92% of security incidents.  Out of the 1,367 confirmed data breaches analyzed, the cyber espionage pattern accounted for 22% of the attackers recorded by Verizon and its partners, while point-of-sale (POS) intrusions made up 14% of the breaches in this year’s report.Still, Web app attacks were far and away the most common threat type, with 35% of all confirmed breaches linked to Web application security issues.

As the report suggests, no one is immune from a data breach and its taking longer to identify compromises within an organization — often weeks or months, while penetrating the organization can take only minutes or hours.  Triumfant emphatically closes the breach detection gap with its rapid detection and response capabilities. Triumfant detects breaches in real-time at the point of infiltration, generates a comprehensive and actionable analysis within minutes of the attack, and builds a situational remediation that stops the breach and repairs all of the primary and collateral damage to the machine within five minutes.

The 2014 Verizon DBIR once again underscores the importance of deploying a more focused and effective way to fight cyber threats.  You will be breached, you are not prepared, and the adversary is taking advantage. A new approach is needed — the endpoint is your last line of defense.

Follow

Get every new post delivered to your Inbox.

Join 479 other followers