Subscribe to ThreatSTOP feed
Updated: 57 min 12 sec ago

ThreatSTOP Protects Workloads in Microsoft Azure with New Cloud-based DNS Firewall

Wed, 06/15/2016 - 00:35
DNS Firewall continuously blocks threats and prevents data theft for cloud workloads

Carlsbad, CAJune 14, 2016ThreatSTOP, Inc., a cloud-based network security provider, today announced the availability of its industry-leading automated threat protection service, the ThreatSTOP DNS Firewall, in the Microsoft Azure Marketplace. In use today by some of the world’s largest organizations, the ThreatSTOP DNS Firewall continuously protects cloud workloads against ransomware, phishing and other attacks, and prevents networks from communicating with command and control.

ThreatSTOP provides proactive protection for organizations migrating to the cloud with the ability to enforce security policies across on-premise, cloud, and hybrid deployments. The ThreatSTOP DNS Firewall provides flexible outbound protection against threats using malicious IP addresses and domains, including wildcards, and provides granular control over actions taken. Threat actions include block, log, and redirection to a walled garden based on DNS query data and resolution path.

“DNS has been central to configuring and accessing Internet services for over 30 years, and today’s Internet requires DNS firewall functionality to keep the enterprise secure,” said Paul Mockapetris, inventor of DNS and Chief Scientist for ThreatSTOP. “Enterprises can use virtual DNS firewalls in their own or a provider’s cloud and stop worrying about maintaining dedicated servers or appliances and their spare parts. DNS Firewall as a Service is here today.”

ThreatSTOP DNS Firewall automatically delivers live threat intelligence to virtual networks in Azure to protect cloud workloads from the latest threats based on user-defined policies. With ThreatSTOP, users customize and manage security policies composed of threat types, severity levels, and user-defined block lists and whitelists. Real-time detailed reporting on malicious activity blocked and machines affected speeds remediation.

“As organizations move workloads to the cloud, they want enterprise-class enhanced security to better protect against the latest threats,” said Gareth Bradshaw, Senior Program Manager for Azure Networking. “ThreatSTOP provides customers with the ability to create customized security policies to protect cloud workloads and virtual desktop infrastructure from the latest inbound and outbound threats. We’re excited to have ThreatSTOP join the ecosystem of security providers in the Azure Marketplace.”

ThreatSTOP delivers a highly scalable defense against advanced cyberattacks by leveraging the power of DNS to protect every device and workload across on-premise and cloud-based networks. More than 900 companies trust ThreatSTOP to protect their networks today. The ThreatSTOP service enables a physical or virtual firewall to deflect inbound attacks, and enables both firewalls and DNS servers to prevent infected hosts from communicating with threat actors trying to extract or alter data. The service is cloud-based, updates automatically and works with leading firewalls and DNS servers.

See ThreatSTOP Founder and CEO Tom Byrnes speak at Microsoft Ignite, and visit booth #314 for a live demo.

About ThreatSTOP

ThreatSTOP is a network security company offering a cloud-based threat protection service that protects every device and workload on a network from cyber attacks and data theft. It can protect any network, from virtual cloud networks to branch LANs to the largest carrier networks. The service leverages market-leading threat intelligence to deflect inbound and outbound threats including ransomware, phishing and botnet attacks, and prevents data exfiltration. For more information visit  


Michael Becce, MRB Public Relations, Inc.
mbecce [at] mrb-pr [dot] com | (732) 758-1100 x104
Brigitte Engel, ThreatSTOP
bengel [at] threatstop [dot] com | (760) 542-1550 x4394

SANS “What Works” Webinar with John Pescatore

Tue, 04/19/2016 - 18:14

Press coverage tends to focus on breaches companies that have failed to protect their business systems and sensitive customer data. However, many enterprises have invested in improved processes, more advanced security products and threat-driven prioritization approaches to show immediate and measurable increases in both the effectiveness and the efficiency of their security programs.

During this SANS What Works webcast, Ken Compres of - Hillsborough Community College District will provide details of his deployment of ThreatSTOP to enable continuous monitoring of advanced targeted attacks, supporting faster and more accurate detection, reduced impact and demonstrating benefits to increased integrity and availability of critical business processes.

Join SANS Director of Emerging Security Trends John Pescatore and Ken Compres to hear details on the selection, deployment and experience using ThreatSTOP. The webcast will contain a discussion of lessons learned and best practices as well as detail the metrics used to demonstrate the value of ThreatSTOP.

More information about this even is available at

Speaker Bios

John Pescatore

John Pescatore (moderator) is the director emerging security trends for the SANS Institute. A former vice president and distinguished analyst at Gartner, Pescatore has over 30 years of experience in computer, network and information security. Prior to joining Gartner, he was senior consultant for Entrust Technologies and Trusted Information Systems and a security engineer for the U.S. Secret Service and the National Security Agency.

Kenneth Compres

Kenneth Compres is the Sr. Information Security and Integrations Engineer at Hillsborough Community College. Also serves as an associate professor of Cyber security at Mercy College and Bloomfield College in New York. At Bloomfield College, He serves as the subject matter expert for curriculum development for Cyber security and information assurance and security programs. He developed the current Disaster recovery plan for the Department of veteran’s affairs in New York harbor, New York. He has developed several “code behind” for security monitoring at the VA hospital in New York. Mr. Compres has several research publications in IEEE (IT Governance, Compliance and Auditing Curriculum--A Pedagogical Perspective). Mr. Compres holds a Master’s of Science with a concentration on Cyber Security from Mercy College, and a Masters in Digital Forensics from the University of South Florida. He is also Global Security Leadership Certificate (GSLC), Fortinet Certified Network Security Administrator, Fortinet Certified Network Security Professional, Certified Ethical Hacker, Network+, Security+, A+, CCENT. Currently pursuing a PhD in Computer science from NOVA. Kenneth Compres has been a guest speaker in New York’s Security in the Workplace (2010, 2011), FireEye, Changing the security landscape, Orlando 2015, Information security today. His most recent publication was published by Hillsborough community college “Managing your digital footprint” October of 2012.

Tags: eventswebinarSANSInterview

ThreatSTOP Inks Distribution Deal with Cloud Harmonics

Mon, 04/04/2016 - 17:19

Carlsbad, CAApril 4, 2016ThreatSTOP, the company that delivers Powerful Security without Complexity™, today announced a distribution agreement with Cloud Harmonics, the fastest growing full-service, next-generation distributor for emerging cybersecurity and cloud solutions. Under the new agreement, Cloud Harmonics will distribute the ThreatSTOP® Shield and DNS Firewall network security platform.

The ThreatSTOP platform delivers up-to-the-minute threat intelligence as operational policies to firewalls, routers and DNS servers to automatically block traffic to and from known malicious sources. This patented functionality helps customers prevent data theft and ensures existing security solutions are delivering maximum protection and value. A cloud-based service, it works with existing network security devices to dynamically update and enforce security policies to ensure continuous protection. It provides a single point of control for devices across multiple locations and from different manufacturers.

Cloud Harmonics works with leading technology providers to help them successfully engage with channel partners to drive adoption of security solutions. Its unique approach begins with providing product training to channel partners, along with technical and sales support services designed to help partners effectively deliver security solutions. Working with Cloud Harmonics, ThreatSTOP will accelerate time to market, drive awareness and grow market share through engagements with the distributor’s channel partners.

“The ability to block inbound malware attacks, ransomware and prevent data exfiltration is a critical component of any security ecosystem," said Anand Desai, VP Marketing and Emerging Technologies, Cloud Harmonics. "Cloud Harmonics is pleased to work with ThreatSTOP, which provides a cloud-based SaaS threat intelligence platform, enabling our more than 400 channel partners to offer this entirely new class of protection capable of addressing the advanced cybersecurity needs of their customers.”

The ThreatSTOP platform deflects inbound attacks such as ransomware, DDoS, and phishing, and prevents communications with command and control servers to prevent theft of sensitive data. Real-time reporting enables customers to pinpoint affected machines for speedy remediation. More than 500 companies trust ThreatSTOP to protect their networks today. It also significantly reduces unwanted network traffic, so security teams can focus on more insidious threats. The platform integrates with leading firewalls, routers and DNS servers.

“Cloud Harmonics is a best-in-class security products distributor with a truly unique model that has proven successful because they provide top-notch training and support to ensure their channel partners are successful,” said Matt Foster, Vice President Business Development and Sales for ThreatSTOP. “ThreatSTOP delivers a channel-friendly security platform that provides immediate protection using existing hardware. It is easy to deploy, instantly effective and highly scalable.”

About Cloud Harmonics
Cloud Harmonics Inc., the fastest growing full-service, Next-Generation Distributor of cybersecurity and cloud technologies, is fueling the channel with its innovative Educate, Engage and Enable model. Working with leading technology providers, such as Aruba Networks, Arista Networks, HPE, Palo Alto Networks and others, Cloud Harmonics provides the awareness, technical proficiency and services support its more than 400 reseller partners need to create opportunities, close deals and secure repeat business. Through its large distribution channel, the company provides resellers access to an arsenal of business applications that streamline sales, reduce costs, and accelerate the adoption of next-generation solutions. To learn more about the world-class training, disruptive engagement methodology and differentiated services and applications that has made Cloud Harmonics the distributor of choice for resellers and technology companies everywhere, please visit

About ThreatSTOP

ThreatSTOP is a network security company offering a cloud-based threat protection platform that prevents cyberattacks and data theft across multiple network layers (edge routers, firewalls and DNS servers). It can protect any enterprise network, from virtual cloud networks to branch LANs to the largest carrier networks. The ThreatSTOP Shield Platform leverages market-leading threat intelligence to deflect inbound and outbound threats, including DDoS, malware, phishing and ransomware attacks, and prevents data exfiltration. For more information visit


Michael Becce, MRB Public Relations, Inc.
mbecce [at] mrb-pr [dot] com | (732) 758-1100 x104

Brigitte Engel, ThreatSTOP
bengel [at] threatstop [dot] com | (760) 542-1550 x4394

Tags: newsCloud HarmonicsDistribution

Los Angeles Times: Why Hackers Are Not Lining Up to Help the FBI

Fri, 03/25/2016 - 18:58

In all of the debate around the Apple vs FBI tussle, many have wondered why someone has not simply stepped up and hacked the phone already.

Today, the Los Angeles Times published an article outlining why hackers are not publicly stepping up to help the FBI.

A few interesting thoughts from the article:

  1. Much of the security industry’s frustration with the FBI stems from the agency’s insistence that Apple compromise its own security.
  2. Going to the FBI before going to the company (in this case Apple) would violate standard practice in the hacking community.
  3. An iPhone 5c vulnerability isn’t considered a hot commodity in the minds of many hackers, who seek to one-up each other by attacking newer, more widely used products.

The article is worth a read.

Tags: news