Staying at the Edge of Day Zero Threats and Vulnerabilities
infotex has always been concerned about making sure that our managed services can address Day Zero threats and vulnerabilities. In this aspect, we have been a leader in the industry. In 2003, we founded Bleeding Snort through the leadership of Matt Jonkman, CISSP.
Prior to its formation, security professionals had to monitor a large number of security mailing lists and websites to glean all of the new Snort signatures that were being discussed and distributed. There was no real way to make sure you had the latest version, or contribute effectively a tweak to improve a signature.
Open Source Signature Clearinghouse
Through 2006, infotex maintained, hosted, and managed bleedingsnort.com. This clearinghouse of signatures for snort, the now defacto standard as an open source network traffic sniffer, quickly grew in membership to include many of our competitors. The fact is that the production of signatures using the open source concept is the quickest way to develop mature signatures for vulnerabilities and threats hours after their discovery.
In 2007, bleedingsnort.com migrated to bleedingthreats.net, then made another transformation (now emergingthreats.net) in 2008 when the project received grant funding from the Army Research Office and the National Science Foundation to continue the project and research. Though ths clearinghouse has grown to a new level, we still remain a proud sponsor of the site.
The infotex ELM System features:
- Competitive Pricing!
- 24 x 7 x 365 Real Time Monitoring!
- Daily Reporting of Actionable Events!
- Trend Reporting – Pushed to you!
- Completely Customized!
- Tuning Process Evolved Since 2005!
- Health Reporting!
- Signature Set Based On Best Practices, FFIEC Guidelines, HIPAA, PCI’s DSS, and CobiT!
- When is a Firewall Not Enough?
Call us for pricing and a demo: (800) 466-9939 x810
A new study shows most Americans fail to understand basic cybersecurity concepts… An Read more
Another awareness poster for YOUR customers (and users). Now that we have our own em Read more
Several New Targets For Ransomware Have Been Identified… An article review. Over the Read more
Incident response testing is the stone that kills many birds… Another one of those Da Read more