Newsletter
Magazine Store
// Set default language to English

10 Fastest Growing Security Companies 2018

Improving the Malware Analytics, Data Breach Protection, and Response Capabilities, Lastline Delivers a Dynamic Blueprint of a Breach As It Unfolds Across a Network

thesiliconreview-christopher-kruegel-ceo-lastline-1

Lastline is revolutionizing the way companies improve network breach protection with malware detection tools that uncover malware- and browser-based attacks and malicious network activity before suffering a costly data breach. And Lastline enables to do this with fewer resources and at a lower cost than existing malware detection tools.

In 2011, Drs. Engin Kirda, Christopher Kruegel, and Giovanni Vigna, three of the world’s most influential academic researchers in cybersecurity, founded Lastline. The company’s vision is informed by the founders’ world-renowned research on malware analysis and evasion techniques, academically-rooted rigor, innovative approaches to network breach protection, and a passion to improve enterprise cybersecurity.

Lastline’s unmatched level of visibility, accuracy, and effectiveness, and its focus on IT managers’ ever-increasing pressure to secure company networks and assets has resulted in the company providing specific, actionable, context-rich threat intelligence and decreased data loss to many of the largest and most successful companies around the world.

The Lastline Mission

Words from the Chief:

“Our mission is to enable our customers to defend their organizations against advanced, evasive malware that cause costly data breaches.

Lastline is dedicated to continuous innovation to provide the best defense against and the most complete visibility into the behavior of advanced malware. Our solution rapidly detects advanced malware that other security solutions miss, eliminating data breaches, therefore saving money and time for our customers while protecting their valuable data and brand reputation.”

Lastline Solutions

How Lastline Achieves Specific Breach Protection Goals

Lastline’s advanced malware detection and breach protection solutions provide the visibility, context, and integration one needs to protect the network from malware-based attacks, for a wide range of use cases. Organizations choose Lastline to:

  • Respond to Network Breaches
  • Defeat Malicious Emails
  • Protect Against Malicious Websites
  • Analyze Network Traffic
  • Detect Malware on Endpoints
  • Block Malicious Objects

Breach Protection Platform

Lastline has created the industry’s most complete Breach Protection Platform to deliver the visibility, context, and integration one needs to defend the network from breaches. It is built on Lastline’s expertise gained from over 10 years of research focused on detecting advanced malware and its behavior once inside a network.

The Lastline Breach Protection Platform provide with a dynamic blueprint of a breach as it unfolds in the network. This blueprint provides with complete breach visibility and context, displaying movement of the attack across the network and the global context of all indicators of compromise (IOCs) related to the attack.

Understanding Advanced Malware

Evasive malware can easily escape detection by “advanced” security technologies like sandboxes, firewalls, and intrusion prevention systems. Evasive malware avoids being detected by sandboxes or other security controls by altering its behavior and adopting one or more evasion tactics.

Lastline detection technology is designed to remain hidden while interacting with advanced malware. The company’s Deep Content Inspection™ environment engages with the malware to catalog every malicious action the malware can take and provide actionable malware analytics. It provides with complete visibility of the full range of malicious behavior engineered within the malware.

The Lastline Behavioral Intelligence Program

The Lastline Behavioral Intelligence™ Program is a behavior-based approach to threat intelligence that improves security effectiveness, speed to remediation, and completeness of remediation. Lastline security experts investigate cyber attacks and make unique actionable information about malware and threats publicly available to improve security teams’ ability to detect and block attacks.

Existing systems are ineffective:

  • Enterprise incident response processes are broken – Due to the homogenous description of detected malware, correctly remediating infected devices is poor and increases the risk to organizations
  • External threat intelligence feeds are fundamentally flawed – They lack the granularity to be truly helpful and are overly focused on external data, not internal activity
  • Intrusion defenses are ineffective – They lack the ability to connect north/south alerts to east/west traffic, precluding the ability to understand the full scope of an attack

Lastline’s unique approach, built on its core strength and differentiator – its insight into malicious behaviors and connecting them to intrusions and breaches – will provide otherwise unavailable analysis and information to inform security teams’ efforts to secure email, web, cloud, and networks.

Meet the Chief

Christopher Kruegel Ph.D., Co-founder & CEO: Christopher’s research interests focus on computer and communications security, with an emphasis on malware analysis and detection, web security, and intrusion detection. Christopher is a Professor of Computer Science at UC Santa Barbara.

He has published more than 100 peer-reviewed papers in top computer security conferences and has been the recipient of the NSF CAREER Award, MIT Technology Review TR35 Award for young innovators, IBM Faculty Award, and several best paper awards. Christopher regularly serves on program committees of leading computer security conferences including Program Committee Chair of the Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET, 2011); the International Symposium on Recent Advances in Intrusion Detection (RAID, 2007); the ACM Workshop on Recurring Malcode (WORM, 2007), and the ACM Conference on Computer and Communications Security (CCS 2016). He was also the head of a working group that advised the European Commission (EC) on defenses to mitigate future threats against the Internet and Europe’s cyber-infrastructure.

“In security, it’s not always easy for customers to understand and evaluate the pros and cons of different solutions. We believe in substance, and we put the security of our customers first.”

NOMINATE YOUR COMPANY NOW AND GET 10% OFF