Promote this Nomination
|Company (that provides the nominated product / solution / service)||Lastline, Inc.|
|Company size (employees)||50 to 99|
|Type of solution||Software|
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:
• It works! Lastline Enterprise is widely acknowledged as the most effective advanced threat detection and protection solution on the market as evaluated by third-party testing agencies and leading security technology providers. Lastline Enterprise received NSS Labs’ Recommended rating for the second year in a row and was the only breach detection product to receive a perfect detection rate of 100 percent in all test categories with zero false positives. And the Forrester Wave™: Automated Malware Analysis Q2 Report identifies Lastline as the strongest current offering on the market. Furthermore, scores of partners thoroughly vetted our solution before coming to the conclusion that Lastline is the best available advanced malware protection solution.
1. Behavioral analysis of potentially malicious files.
Our ability to detect advanced malware is unmatched. Our Deep Content Inspection™ provides the highest level of visibility into the specific behaviors any piece of malware is designed to execute while remaining undetectable by attackers. There is not a malicious activity that we cannot see.
2. Network traffic analysis.
Effective malware protection also requires the ability to detect the behaviors of malware that is already resident on a network or enters through infected personal devices or unprotected gateways. Our malware detection is enhanced by our network traffic analysis that detects suspicious network activity such as C&C communications, lateral movement, and efforts to detect or adjust security settings.
3. Threat Intelligence.
The Lastline Global Threat Intelligence Network adds context to threat analysis by consolidating details about malicious files and their associated behavior from all customers and partners in the Lastline community. Details include active C&C servers, objects with zero-day exploits, Indicators of Compromise (IoCs), toxic websites and malware distribution points identified as having breach intent. Information in the Threat Intelligence Network from previous attacks can inform analysis of new attacks to speed detection and focus analysts’ efforts on specific actions required to prevent a data breach.
4. Data sharing with leading security solutions.
We have proven integrations with scores of security solutions. Our strategy is to fit into existing architectures instead of operating as another stand-alone appliance. Our technology can ingest data from other solutions to inform our analysis and provide additional context for suspicious activity. In addition, Lastline can push information to other solutions to improve their effectiveness, such as sending blocking rules to NGFWs or UTM devices, send breach event information to SIEMs, block connections via Intrusion Prevention Systems, or add evasive malware understanding to Secure Web or Email Gateways.