<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Krueger Wholesale Florist Uses ThreatSTOP to Block Botnets

Krueger Wholesale Florist, a Wisconsin-based distributor of fresh cut flowers, green plants and supplies to customers across a nine states, has deployed an EdgeWave iPrism Web Security solution to four separate locations with hundreds of employees.  One of the key reasons for EdgeWave's win was ThreatSTOP, whose botnet blocklist is integrated into the iPrism.  This is often the case with EdgeWave, Simwood and other partners, where ThreatSTOP provides a key differentiator and value unavailable anywhere else.

Read More

Share this:

ThreatSTOP integrated into DDoS Protection Service

In another illustration of ThreatSTOP's wide-ranging value proposition for different use cases and customers, we have been integrated into a multi-layered DDoS (distributed denial of service) protection service provided by British service provider Simwood.  ThreatSTOP will be Layer B of the service (out of 4 layers)  that drops “dirty traffic” from malware and botnet sites at the IP level, which is a very efficient approach to increase clean traffic for the network.  ThreatSTOP uses only 2-8% of the comparable bandwidth to filter inbound traffic compared with packet inspection products prevalent in the market.

Read More

Share this:

Block China and other simple DLP/APT remedies

Blocking foreign countries is one of the simplest and most effective ways to stop data loss and other hack attacks. If your computers/servers/users ... have no reason to communicate with devices in certain countries then a geographic block on the firewall to stop all traffic to/from them is a great way to reduce the threat of infection or data loss. What may be the most serious data breach ever - the loss of some 35 million records of personal data from the Korean company SK Comunications - would have been stopped if the SK Comunications computers had been blocked from communicating with China:

Read More

Share this:

Academic Freedom Need Not Mean Botnet Infections

ThreatSTOP has a number of universities and places of higher education as clients and, it turns out, there's a good reason for this. That reason is 'Academic Freedom' and the possibly unintended consequences of that on computers and networks.

Read More

Share this:

The ineffectiveness of AV

Over at ZDnet Ed Bott has a report on the ineffectiveness of anti-vrus tools against current malware where he notes that many AV vendors only detect it a day or two after it has been distributed and that by then a new variant that they don't detect has also been sent out. In the IT security space, this is not exactly new news. In fact here at ThreatSTOP, we've been using similar statistics in our sales pitch for about a year now and in fact the AV vendors themselves admit they have a problem. If you ask them in private that is.

Read More

Share this:

SonicWALL IP Reputation Fail

Since ThreatSTOP is an IP Reputation company, we naturally have a google news feed on the topic of 'IP reputation'. Today, for some reason, it provided a link to the IP reputation page of the firewall vendor SonicWALL. Naturally I had to test the page out to see how well it did. I picked the 4 addresses currently listed on our home page as being the "worst of the web":

Read More

Share this:

ThreatSTOP blocking osCommerce vulnerability

ThreatSTOP subscribers are protected against visiting infected osComemrce sites - current google reports over 5,000,000 hits for the vulnerability. The ip address for the most prevalent domain (willysy.com) is currently in our emergency feed, the one for the other domain (exero.eu) has been in one of our feeds for a week and has now been added to our emergency feed as well.

Read More

Share this: