Cyveillance IP Block List: Real-Time Data Protects Against Online Threats

Cyveillance announced it will offer its Cyveillance IP Block List, which ought to reduce network and user exposure to live threats through real-time data feeds. As online malicious activity continues to grow in volume and complexity, this service ought to allow enterprises to adopt a more proactive, outward-looking security posture.

Most companies currently use anti-virus software to combat Web threats by monitoring personal computers and enterprise networks. But according to Cyveillance such signature-based security applications detect less than half of new malware, and cannot keep pace with constantly evolving threats. They are especially inadequate on “zero day” (the first 24 hours of an attack) – and “zero day” is when the most damage is done.

“Mass infection of both servers and desktop PCs by malware and ‘bot’ software has given online criminals access to an endless, cost-free infrastructure on which to run, control and host their illegal activities,” said Panos Anastassiadis, COO, Cyveillance. “We want to decrease the likelihood of successful online crime by making our customers aware of online threats before they become a problem for individual users and networks. This reduces the possibility of compromised IT infrastructure, and helps them survive even under attack.”

The Cyveillance IP Block List ought to give users timely, accurate warning of high-risk hosts, URLs, payloads and Internet Protocols (IP) involved in a wide range of malicious online activities. Specific benefits and applications include:

  • reduced phishing of employee information (i.e. financial, login credentials, etc.)
  • reduced rate of malware and viruses on employee computers and resulting activity loss and potential hacks of network resources
  • reduced risk of network penetration
  • reduced IT costs for malware remediation, PC repair and IT equipment inventories
  • blocking information for malware arriving weeks ahead of traditional security vendor recognition
  • IP information to better secure Web-based applications and authentication protocols
  • information revealing compromised resources or connections to known dangerous hosts

(Source: Cyveillance/GST)

Matomo