eSentire media contact
Cambridge, Ontario & San Francisco, CA – March 1, 2016 – eSentire, Inc., a leader in Active Threat ProtectionTM solutions and managed security services, today announced CymonTM, the world’s largest open source threat intelligence aggregator of its kind. Cymon ingests 180+ sources daily to track malware, phishing, botnets, spam, and more, adding over 20,000 unique IPs to its database every day.
eSentire’s Security Operations Center analysts and Professional Services groups have been using Cymon for security investigations since its beta launch in late 2014. To date, Cymon has logged more than 6 million IP addresses and more than 33.7 million security events. Source data is collected from a multitude of 180+ sources including publicly available industry, government, and commercial threat intelligence feeds, VirusTotal, Phishtank, blacklists, antivirus vendor source reports, and eSentire’s own proprietary intelligence lists.
“We recognize the strength that comes from information sharing, particularly when it comes to cybersecurity intelligence within the InfoSec community,” said Eldon Sprickerhoff, founder and chief security strategist, eSentire. “This aggregation effort will help improve the security stance of the Internet in general, by offering researchers and incident handlers better access to curated malicious data.”
Main features of Cymon include:
- Available to the public
- Cymon database is fully searchable by IP, domain, URL, or hash
- Web interface provides a detailed timeline and events acquisition chart
- Threat reports – see historical IP data to support a forensic investigation
- Filters and alerts – get notified when employees, your company, or partners end up on a hacker’s target list
- Open APIs – a full set of REST APIs lets users integrate Cymon in their business processes
- Personalized dashboard for registered users
- Interface visualization provides macro and micro global heat map views
- Pastebin monitoring
- Cymon InterceptorTM, a Google Chrome plug-in (coming soon)
Coming this Spring, Cymon Interceptor is a Chrome browser plug-in that makes Cymon’s capabilities broadly available, providing protection for individuals personal devices.
Cymon’s malicious IP address queries are freely available to other threat intelligence researchers. For more information, or if you suspect that a specific IP address has a history of hosting malicious content or activity, query Cymon through its website: www.cymon.io, or follow @cymonbot on Twitter and request an IP scrub.
eSentire will showcase Cymon in booth #S2315 (South Expo) at the 2016 RSA Conference (February 29-March 3) in San Francisco, CA.
About eSentire Inc.
eSentire® is a proven industry leader, keeping mid-sized organizations safe from constantly evolving cyber attacks that traditional security defenses simply can’t detect. eSentire combines people, process, and technology to deliver an unmatched, premium level service that detects, remediates, and communicates sophisticated cyber threats in real-time, 24x7. Protecting more than $3 trillion in Assets under Management (AUM), eSentire is the award-winning choice for security decision-makers in mid-sized enterprises. eSentire has received multiple accolades for exceptional service, including the HFM (Hedge Fund Manager) Service Provider award (2013, 2014, 2015, 2016). In 2015, eSentire was named to Deloitte’s Technology Fast 50TM and Fast 500TM lists, and included in the 2015 “Cool Vendors in Cloud Security Services” report by Gartner, Inc.
For more information, visit www.esentire.com and follow @esentire on Twitter.
About Active Threat Protection
eSentire’s Active Threat ProtectionTM service keeps mid-sized organizations safe from constantly evolving cyber attacks that traditional security defenses are unable to detect. It delivers continuous monitoring, real-time threat detection, and containment technology as a service, with human threat analysts on a 24x7x365 basis. eSentire challenges legacy security approaches, combining behavior-based analytics, immediate remediation, and advanced threat intelligence.
Product or service names mentioned herein may be the trademarks of their respective owners.