By constantly monitoring for untrustworthy behavior in runtime, across real-world production networks, systems and applications -- and then correlating in-depth security information across all existing IT security infrastructure, TaaSERA provides organizations with the most practical, real-world view into emerging attacks that remain their most significant points of risk.
"Our solutions represent the application of intelligent behavior analysis, detection and information sharing in the computing environment, mirroring techniques used by the world's leading law enforcement organizations to find potential attackers and assess their level of risk. Having an expert such as Former Secretary Ridge working with us as an advisor is a tremendous advantage in evolving our detection models," said Srinivas Kumar, CTO of TaaSERA. "The longstanding approach of using network gateways, user authentication and endpoint antivirus to prevent breaches isn't working against today's advanced malware attacks; just as in the physical world, new techniques are needed to safeguard our virtual assets."
TaaSERA builds malware behavior detection solutions used by the world's leading companies and government agencies to identify previously unseen attacks as they transpire and inform response that prevents resulting in data breaches or interruption IT systems.Unlike technologies that review signatures or other historical data, assess potential vulnerabilities or analyze the impact of malware programs in non-production environments, TaaSERA's software solutions leverage patented behavior detection capabilities to highlight the emergence of previously unseen attacks as they are being carried out -- providing organizations with the specific information necessary to adjust defenses and mitigate vulnerabilities targeted by today's sophisticated threats. Available in 2013, TaaSERA will provide an embedded source of strategic intelligence within a broad range of third party solutions and services. The TaaSERA Attack Warning and Response Engine (AWARE) improves the effectiveness of nearly every element of today's layered IT security defenses to boost protection of underlying business systems and information, and prevent costly data breach incidents.