ROCKVILLE, Md.--(BUSINESS WIRE)--Enterprise endpoint security provider Triumfant, today announced the availability of AtomicEye’s analytics capabilities in the cloud. While the company’s innovative agents remain on the endpoint, they can now communicate with the cloud and can be incorporated to work with any data provider. The ability of Triumfant’s AtomicEye to thoroughly detect and quickly respond to sophisticated attacks that bypass traditional, signature-based defenses, is now readily available to those utilizing cloud-based solutions.
Triumfant’s initial cloud offering is a strategic partnership with NetWatcher, a leading network monitoring tool and threat detection platform. Working in conjunction with NetWatcher’s Security-as-a-Service platform and hosted on its secure cloud, AtomicEye offers NetWatcher customers and partners a multi-tenant endpoint solution. Specifically, the AtomicEye platform is integrated into the NetWatcher Managed Services Partner portal so remediation can be done remotely and endpoint security events can be leveraged by both AtomicEye and NetWatcher’s Advanced Correlation Engine – instantly repairing the endpoint and any collateral damage within minutes of an attack.
“As more and more companies are turning towards the cloud for security, we are making our products more accessible, regardless of the type of platform our customers are using,” said John Prisco, CEO of Triumfant. “Expanding to the cloud allows us to stay at the forefront of endpoint security and allows us to make our patented analytics available to anyone looking to utilize the cloud to quickly and effectively detect and remediate security breaches. We are pleased to collaborate with NetWatcher to kick-off this initiative and look forward to continued innovation coming from our two companies working together.”
AtomicEye combines efficient anomaly discovery with analytics that provide the context necessary to identify malicious activity, determine the threat and impact of that activity, and automate the construction of situational, contextual and precise remediation that repairs the attack and all associated damage to the machine. AtomicEye ensures that once inside a company’s or government agency’s systems, no attacker can leave with proprietary information, damage to enterprise systems is minimized, and critical assets are secured. AtomicEye discovers the attacks that evade other tools and fixes what it finds, effectively eliminating the reliance on prior knowledge and the organizational risk caused by that reliance.
“NetWatcher integrates seamlessly with AtomicEye as a cloud solution,” said Scott B. Suhy, CEO of NetWatcher. “We focus on enabling customers to immediately deploy services to their customers and we welcome the opportunity to include AtomicEye along with our other proven solutions to address today’s sophisticated security vulnerabilities and exploits.”
For more information about AtomicEye and Triumfant’s cloud offering, please visit http://www.triumfant.com/.
The NetWatcher Security-as-a-Service platform enables Managed Security Providers (MSPs) to sell cost-effective 24 x 7 security services to their customers. Many government and industry compliance requirements, and security best practices, outline the need for continuous monitoring, intrusion detection, active scanning, netflow analysis, event management and end point integration. NetWatcher enables an MSP to immediately deploy these services to their customers and take advantage of our fully-staffed Security Operations Center (SOC). This means superior protection with no capital outlay, resource commitments and additional headcount. Learn more at: http://netwatcher.com.
Triumfant provides continuous protection from advanced malware threats on the endpoint, stopping cyber criminals in their tracks. Offering the most advanced detection capabilities and featuring enhanced memory and Mac features, Triumfant ensures that once inside a company’s or government agency’s systems, no attacker can leave with proprietary information, damage to enterprise systems is minimized, and critical assets are secured. Triumfant stops a breach before it becomes a full-scale attack then automatically repairs the machine(s) and any collateral damage within minutes – no human intervention or system downtime is required. When attacks occur, companies and government entities trust Triumfant to quickly recover and prevent loss. Visit www.triumfant.com.