Staying at the Edge of Day Zero Threats and Vulnerabilities
infotex has always been concerned about making sure that our managed services can address Day Zero threats and vulnerabilities. In this aspect, we have been a leader in the industry. In 2003, we founded Bleeding Snort through the leadership of Matt Jonkman, CISSP.
Prior to its formation, security professionals had to monitor a large number of security mailing lists and websites to glean all of the new Snort signatures that were being discussed and distributed. There was no real way to make sure you had the latest version, or contribute effectively a tweak to improve a signature.
Open Source Signature Clearinghouse
Through 2006, infotex maintained, hosted, and managed bleedingsnort.com. This clearinghouse of signatures for snort, the now defacto standard as an open source network traffic sniffer, quickly grew in membership to include many of our competitors. The fact is that the production of signatures using the open source concept is the quickest way to develop mature signatures for vulnerabilities and threats hours after their discovery.
In 2007, bleedingsnort.com migrated to bleedingthreats.net, then made another transformation (now emergingthreats.net) in 2008 when the project received grant funding from the Army Research Office and the National Science Foundation to continue the project and research. Though ths clearinghouse has grown to a new level, we still remain a proud sponsor of the site.
The infotex ELM System features:
- Competitive Pricing!
- 24 x 7 x 365 Real Time Monitoring!
- Daily Reporting of Actionable Events!
- Trend Reporting – Pushed to you!
- Completely Customized!
- Tuning Process Evolved Since 2005!
- Health Reporting!
- Signature Set Based On Best Practices, FFIEC Guidelines, HIPAA, PCI’s DSS, and CobiT!
- When is a Firewall Not Enough?
Call us for pricing and a demo: (800) 466-9939 x810
An honest sidebar. In the past year, we have received feedback from our regular webin Read more
Some of them about passwords . . . By view count, here are the top seven posters as o Read more
Experts warn that criminals may be trying to take advantage of the rush of shoppers… Read more
Recent revelations are a reminder of the risks associated with networked devices… An Read more