New Free Service Provides Rapid Visibility of Compromised Systems
San Mateo, CA – July 1, 2014 – AlienVault™, the leading provider of Unified Security Management™ solutions and crowd-sourced threat intelligence, today announced an updated version of Open Threat Exchange™ (OTX), which includes OTX ThreatFinder, a new free service enabling security professionals to quickly and easily analyze their network ecosystems for compromised systems and malicious communication.
AlienVault OTX now delivers alerts on communications related to known malicious hosts, enabling organizations to detect compromised systems and minimize data exfiltration. It also provides rapid insight via an interactive threat map that charts all of the countries an organization’s systems are communicating with.
Security professionals can easily upload their raw logs into OTX and quickly and easily run log analysis without installing any new software or hardware. OTX also integrates with AlienVault Unified Security Management™(USM) platform and OSSIM to provide users with threat intelligence about known malicious IPs from outside their network, which is particularly useful in rapid incident response.
“In today’s evolving threat landscape, it has become more of a challenge for organizations, particularly those in the mid-market, to detect where the true threats lie without tapping into a broader and often already-stretched IT budget,” said AlienVault Vice President of Product Strategy, Russ Spitler. “By offering this capability as a free tool, AlienVault helps organizations gain greater visibility into their networks and makes existing IT resources more effective in rapidly detecting and responding to threats.”
Additional new features include:
Since its release, AlienVault OTX has built up a presence of more than 8,000 contributors from 140 countries, and more than 17,000 threat data updates are made on the system every day. The diversity, analysis and quality of OTX make it the industry’s most robust, open crowd-sourced threat intelligence sharing system, with threat data sourced from private partnerships and public sources worldwide and a proven algorithm that helps validate sources and threats.
Email: [email protected]