Threat X adds key capabilities to counter cyber attack threats

Thursday June 28, 2018 0 comments Tags: Denver, Threat X, Bret Settle

DENVER -- Threat X, a provider of SaaS-based web application firewall (WAF) solutions, announced the addition of key capabilities to help global customers confidently and rapidly identify, profile, and intercept a wide range of threats, including DDoS, Bot and zero-day attacks while increasing application performance.threat-x-logo

Additionally, flexible, cloud-native deployment options mean organizations can deploy and scale Threat X in hours compared to the weeks associated with traditional WAF deployments, the company said.

Security teams are currently challenged to protect the large attack surfaces presented by complex technology environments from an ever-evolving threat landscape.

These teams simply cannot spend time managing multiple security products or be burdened with manual threat analysis if they expect to effectively protect their applications.

Available now as part of the Threat X platform, these new capabilities capitalize on machine learning and attacker profiling to automate the precise detection and neutralization of advanced threats.

Security personnel can now quickly and effectively protect their application environments without the large management overhead associated with disparate products and rule-based WAF solutions.

Threat X said its enhanced DDoS, Bot Detection and Edge Caching capabilities draw on unique, behavior-based analytics and risk, site and application profiling, as well as attacker fingerprinting to continually detect advanced threats and optimize application performance.

Unlike current WAFs, Threat X said it now offers a complete solution that is purpose built to reduce false positives across a wide range of evolving threats, freeing up security teams to focus on top risks and security strategy.

New capabilities include:

  • “Attacker Centric” dynamic detection and neutralization capabilities: With enhanced DDoS Mitigation and Bot Detection capabilities now included in its behavior-based attack profiling, Threat X can detect and neutralize with high precision layer 7 attacks, OWASP top threats, Bots, DDoS, and zero-day attacks. Threat X also features new site and application profiling to help companies block many key exploits of attacks, long before they become an issue.
  • Container based, native-cloud and SaaS deployment: With continuous innovation in cloud-native and on-premise deployment capabilities, Threat X customers can now deploy sensors in minutes via SaaS, or Docker native containers in public or private clouds. Once deployed, Threat X can begin accurately blocking attacks in a matter of hours, providing total coverage and visibility across all web and cloud applications, APIs, and microservices.   
  • Advanced Edge Caching and site performance tuning: With new static and dynamic resource caching, image optimization, inlining and manual cache purging, Threat X’s latest release addresses customer impacting performance issues prevalent in slower, back-end applications and content-heavy web properties.
  • Threat X Labs operations center: With its new Colorado location, Threat X Labs extends security team capabilities with proactive identification of target vulnerabilities, and 24x7, expert responses to high-risk events, freeing customers to focus on their core business with the confidence that their application security is addressed.

“In today's dynamic threat environment, security teams struggle to put together a comprehensive web application security approach, often deploying several standalone products that simply can’t provide a holistic view into vulnerabilities and threats,” said Bret Settle, Threat X CEO.

“We believe that by combining these new capabilities with our proven behavior-based, next-gen WAF, we are helping our customers take a huge leap forward in how they deploy and manage their web application security.

“Now any organization can take advantage of a truly integrated solution that detects and neutralizes all types of web application attacks before they can materially impact the business.”