A blended threat
will attempt to attack a system in a number of different ways.
The new release of MailMarshal SMTP including the Blended Threat
Module is the first M86 Security product to fully interact with the behavioral malware detection technology from Avinti, acquired by M86 earlier this year.
Based on Avinti's unique behavior-based technology, Marshal8e6's Blended Threat
Module[TM] for MailMarshal SMTP and R3000 products will provide organizations a cloud-based service to stop blended threats
The acquisition strengthens Marshal8e6's ability to stop the emerging threat techniques known as blended threats
and bridges the gap in security protection between email and the Web.
are an increasingly popular way for hackers to bypass traditional e-mail security by using messages that include embedded hyperlinks to URLs or IP addresses on the Web.
attacks have risen, as hackers have increasingly used the tactic to circumvent detection by traditional signature-based AV products.
Our signatures are specifically designed to catch variants of blended threats
such as the Storm Worm.
Aladdin Knowledge Systems announced the general availability of eSafe 4 Feature Release 2 the latest version of its integrated proactive content security solution with new AppliFilter technology to block blended threats
The survey, conducted in late August of 200 IT security officials from Germany, France, Sweden, Netherlands and the United Kingdom, said 28 per cent of the respondents do not have any fortifications in place to prevent blended threats
are more difficult to protect your computer against as they distribute themselves like a virus but behave like a worm (a programme that replicates itself by slithering through networks and eating up storage space) and also have traits of a Trojan horse (a malicious programme disguised as something benign like a screen saver).
The key to effectively secure an enterprise against such blended threats
is to address security across all tiers--the gateway, server, and desktop--and across multiple functions--firewall, anti-virus, virtual private networking, intrusion detection, and vulnerability management.
0 detects and removes all forms of adware and spyware including Trojans, keyloggers, system monitors, blended threats
, and it can discover and eradicate more than 27,000 spyware traces.
Dealing with today's growing number of complex blended threats
requires a fast response based on timely and accurate information," said John O'Keefe, senior Internet services analyst, Current Analysis, Inc.
It does not, however, eliminate the risk to the storage system itself nor does it address more aggressive blended threats
And despite the fact that an estimated 95% of all organisations already deploy an antivirus solution, 238 responded that they are evaluating antivirus technologies to bolster their defence against the new viruses and blended threats
that respondents identified as a business challenge in the year ahead.