Communiqués de presse

CounterTack Launches Digital DNA® Ecosystem Product Licensing Program for Advanced Threat Protection & Analysis Capabilities

At the RSA Conference 2017, CounterTack announces its Digital DNA (DDNA) Ecosystem. Through the Ecosystem, partners can integrate the market’s only comprehensive behavior-based memory analysis intelligence engine, Digital DNA (DDNA). Symantec is the newest partner to join CounterTack’s unique ecosystem to integrate the DDNA technology into its Malware Analysis solution.

read more

CounterTack Introduces ThreatScan PRO and Cloud-Based Endpoint Scanning

At the RSA Conference 2017, CounterTack announces cloud-based endpoint scanning with its new ThreatScan PRO. ThreatScan PRO leverages behavioral trait intelligence to enable an easy-to-deploy, memory-based endpoint threat scanning solution to assess environments for malware infections and other indicators of compromise.

read more

CounterTack Introduces The Endpoint Threat Platform

At the RSA Conference 2017, CounterTack, formally introduced its new flagship product, the Endpoint Threat Platform (ETP). Leveraging a single, powerful endpoint sensor, the new Endpoint Threat Platform delivers a robust suite of endpoint security capabilities, including EDR (Endpoint Detection and Response) and dynamic prevention, and meets the needs of sophisticated security teams across multiple use cases including Insider Threat and Incident Response (IR).

read more
Détection et réponse gérées Titan
Antivirus de nouvelle génération
Détection et réponse sur les terminaux
Détection et réponse sur le réseau
Détection et réponse sur les boîtes de messagerie
Détection et réponse face aux menaces internes
Gestion des pare-feu
Gestion des SIEM
GoSecure Titan
Logiciel Titan
Sécurité de la messagerie
Sécurité Web
Boîte à outils «Responder PRO Forensics»
Services professionnels
Évaluation de la cybersécurité
Évaluation de la compromission de la sécurité
Piratage éthique
Réponse aux incidents et analyse de type «forensics»
Services de conformité et d’audit
Technologies fournies par des tiers

Pin It on Pinterest