Blue Coat takes the wraps off Advanced Threat Protection

New product offers full lifecycle management and customisation, company claims.

Malware

Security vendor Blue Coat has announced an anti-malware product that it claims is the first to bridge the gap between day-to-day operations, incident containment and resolution.

The offering, dubbed Advanced Threat Protection, offers what the company describes as "total lifecycle management" of advanced malware such as Trojans, persistent threats and phishing attacks.

Greg Clark, Blue Coat's CEO, told IT Pro: "The security industry has typically been focused on perimeter defence against malware, with a focus on blocking known malware.

"Blue Coat is in the business of not only blocking known malware, but being able to determine why you are having to block that malware and go after the root cause of that. For example, if one employee has suffered a phishing attack or visited a poisoned website."

The organisation also claims to be able to protect against unknown malware by alerting security administrators to any unusual or novel code that is attempting to download onto the network. The threat can be sandboxed and examined to determine if it is a genuine threat or not.

Clark added that Advanced Threat Protection is unique in that it offers greater customisability than other anti-malware offerings.

"Blue Coat's technology is really positioned to empower a business to have the right to choose the type of technologies that make them more competitive," he said.

"We really want our customers, business owners and employees to be able to use the best technology on the market and to do that in a way that enables them to still assure the business and manage the risks they have."

Advanced Threat Protection is available immediately.

Featured Resources

Become a digital service provider

How to transform your business from network core to edge

Download now

Optimal business results with the cloud

Evaluating the best approaches to hybrid cloud adoption

Download now

Virtualisation that enables choices, not compromises

Harness the virtualisation technology that's right for your hybrid infrastructure

Download now

Email security threat report 2020

Four key trends from spear fishing to credentials theft

Download now

Recommended

Android malware vendor teams with marketer to promote new malware
malware

Android malware vendor teams with marketer to promote new malware

11 Jan 2021
Python-based malware steals Outlook files and browser credentials
malware

Python-based malware steals Outlook files and browser credentials

15 Dec 2020
Subway UK customers targeted by Trickbot hackers
hacking

Subway UK customers targeted by Trickbot hackers

14 Dec 2020
Power banks could infect your smartphone with malware
malware

Power banks could infect your smartphone with malware

9 Dec 2020

Most Popular

How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
The fate of Parler exposes the reality of deregulated social media
Policy & legislation

The fate of Parler exposes the reality of deregulated social media

14 Jan 2021
Should IT departments to call time on WhatsApp?
communications

Should IT departments to call time on WhatsApp?

15 Jan 2021