Blue Coat takes the wraps off Advanced Threat Protection
New product offers full lifecycle management and customisation, company claims.
Security vendor Blue Coat has announced an anti-malware product that it claims is the first to bridge the gap between day-to-day operations, incident containment and resolution.
The offering, dubbed Advanced Threat Protection, offers what the company describes as "total lifecycle management" of advanced malware such as Trojans, persistent threats and phishing attacks.
Greg Clark, Blue Coat's CEO, told IT Pro: "The security industry has typically been focused on perimeter defence against malware, with a focus on blocking known malware.
"Blue Coat is in the business of not only blocking known malware, but being able to determine why you are having to block that malware and go after the root cause of that. For example, if one employee has suffered a phishing attack or visited a poisoned website."
The organisation also claims to be able to protect against unknown malware by alerting security administrators to any unusual or novel code that is attempting to download onto the network. The threat can be sandboxed and examined to determine if it is a genuine threat or not.
Clark added that Advanced Threat Protection is unique in that it offers greater customisability than other anti-malware offerings.
"Blue Coat's technology is really positioned to empower a business to have the right to choose the type of technologies that make them more competitive," he said.
"We really want our customers, business owners and employees to be able to use the best technology on the market and to do that in a way that enables them to still assure the business and manage the risks they have."
Advanced Threat Protection is available immediately.
Become a digital service provider
How to transform your business from network core to edgeDownload now
Optimal business results with the cloud
Evaluating the best approaches to hybrid cloud adoptionDownload now
Virtualisation that enables choices, not compromises
Harness the virtualisation technology that's right for your hybrid infrastructureDownload now
Email security threat report 2020
Four key trends from spear fishing to credentials theftDownload now