CloudSOC Pilots DNS Analytics to Identify Insider Threats and Sophisticated Malware
CloudSOC LLC provides deep analysis and alerting of suspicious events, identifying gaps in existing security controls and highlighting insider threat, malware, and APT behavior.
SAN FRANCISCO, Feb. 19, 2014 /PRNewswire-iReach/ — CloudSOC LLC today announced a pilot program for clients wishing to adopt its CloudSOC(TM) platform and DNS analytics tools to identify state-sponsored attacks, malware, and APT threats within enterprise environments. The extensible CloudSOC(TM) platform provides existing Splunk® users with a series of plug-and-play applications for security information and event management (SIEM) purposes.
Current research shows that all known state-sponsored malware and advanced persistent threat (APT) campaigns exhibit DNS indicators of compromise (IOC). These campaigns include Stuxnet, Flame, Hidden Lynx, Operation Troy, The NetTraveler, Operation Hangover, Mandiant® APT1, and Careto. Each of these sophisticated malware campaigns can be identified within complex environments through the use of DNS analytics and the CloudSOC(TM) platform. Since 5 December 2013, CloudSOC LLC has released plug-and-play applications for Splunk® that allow users to effectively identify gaps within their existing security controls and mechanisms.
Availability and Pricing
CloudSOC(TM) DNS analytics for server environments is a Splunk® App that is available via the CloudSOC(TM) web site at http://www.cloudsoc.com. CloudSOC LLC is welcoming new clients to beta test and pilot its emerging security analytics applications, and can be contacted for further information at firstname.lastname@example.org.
About CloudSOC LLC
Incorporated in 2013, CloudSOC LLC develops cutting edge security and compliance applications that integrate with the CloudSOC(TM) platform. CloudSOC applications perform data analytics for security information and event management (SIEM) purposes, allowing users to quickly and effectively identify insider threats, APT issues, zero-day attacks, and state-sponsored malware campaigns within complex environments. Learn more about CloudSOC LLC at http://www.cloudsoc.com, and follow us on Twitter @CloudSOC.
Published Research Citations
-- Stuxnet -- Flame -- Hidden Lynx -- Operation Troy -- The NetTraveler -- Operation Hangover -- Mandiant® APT1 -- Careto
The Splunk® trademark and product and service names are the intellectual property of Splunk Inc.
The Mandiant® trademark is the intellectual property of Mandiant, A FireEye Company.
Media Contact: Max Hughes, CloudSOC LLC, (702) 465-0549, email@example.com
News distributed by PR Newswire iReach: https://ireach.prnewswire.com
SOURCE CloudSOC LLC