ThreatARMOR Kicks Cyber Risk to the Curb, Named Marsh Cyber Catalyst Solution

Cyber Risk? We don't need no stinking cyber risk.

It’s easy to conflate risk management and security on the surface, but they’re really two separate entities. The latter involves improving your organization’s overall security posture and defending against a broad range of threats, but that’s only half the battle. Managing cyber risk means mitigating liabilities — like a DDoS attack bringing down a manufacturing plant, or a data breach exposing the company to legal action and compliance fees — and that's a bit tougher. Is a new tool the answer, or is another dashboard just going to complicate things further? Can cyber insurance help? How can you free up valuable cycles for your staff to investigate incidents?

That's a lot to think about — and it's just the tip of the iceberg. But let me let you in on a little secret: there's an easier way. It turns out that Marsh, one of the global leaders in insurance broking and risk management, has already done the hard work for you. In fact, they developed their annual Cyber Catalyst evaluation program to handpick some of the market's best solutions for mitigating cyber risk.

And here's the best part: Marsh selected our very own threat intelligence gateway, ThreatARMOR, as part of it's 2020 class of Cyber Catalyst solutions! How cool is that?

what is marsh cyber catalyst, anyways?

Long story short: it's a pretty big deal. The Cyber Catalyst by MarshSM program is designed to provide organizations with greater clarity and confidence in choosing cybersecurity products in the face of growing uncertainty. Backed by leading insurers, the program enables customers that adopt designated technologies to be considered for enhanced terms and conditions on cyber insurance policies from participating insurers.

So How Exactly Does ThreatARMOR Help Reduce Cyber Risk?

Keysight ThreatARMOR - Marsh Cyber Catalyst

Part of Keysight's Security Operations Suite, ThreatARMOR helps you reduce cyber risk by serving as a first line of defense against attackers — applying an always-on stream of threat intelligence directly to your network to stop ransomware, botnet, phishing, and other malicious traffic in its tracks. Complementing existing security infrastructure, ThreatARMOR reduces your attack surface by blocking as much as 80% of malicious traffic at the source — reducing alert fatigue by eliminating non-actionable threats along with the alerts they generate. Moreover, should an attacker make it past your defenses, ThreatARMOR can also helps prevent malware and ransomware infections from spreading by blocking their Command and Control connections and helping you quickly pinpoint infected machines.

Want to learn more about ThreatARMOR? Give this a read: ThreatARMOR: Block Threats, Reduce Your Attack Surface, and Prevent Alert Fatigue.

The world leader in application and security testing, our Application and Threat Intelligence (ATI) Research Center keeps ThreatARMOR updated with the latest threats — individually validating every single blocked IP address, every single day. Detailed Rap Sheets provide clear, on-screen proof of malicious activity for all blocked sites to mitigate the risk of false positives. Our database contains more than 50 million records, and millions of new threats are analyzed and cataloged each month.

Check out our white paper, Know Your Adversary: Strengthen Security with Application and Threat Intelligence, if you're interested in learning more about our ATI team.

Stay Tuned

Watch this space for the latest news and updates. Whether you're looking for the latest on Threat Simulator and BreakingPoint, or our takes on emerging attacks like the FireEye and SolarWinds breaches, we've got you covered.

Stay safe out there!

limit
3