Nominum Partners with Malwarebytes to Add Remediation Options to its Network Protection and Device Security Solutions for Service Providers

Nominum Partners with Malwarebytes to Add Remediation Options to its Network Protection and Device Security Solutions for Service Providers

Combination of Nominum N2 Product Suite with Malwarebytes Brings Closed Loop Security Experience to Subscribers with Infected Devices

REDWOOD CITY, CA—March 30, 2017Nominum™, the DNS security innovation leader and first to market with an extensible DNS-based platform that accelerates digital transformation for service providers, and Malwarebytes, the leading advanced malware prevention and remediation solution, announced that they have joined forces to strengthen service provider cybersecurity services. Through this partnership, Nominum and Malwarebytes are delivering a closed loop security offering to communications service providers (CSPs)—an end-to-end solution that enables DNS-based network protection, subscriber security and personalized notifications, along with an easy-to-use, client-based option for scanning and remediating infected desktop and mobile devices—providing subscribers with a single solution for protecting and securing their online activities.

The Nominum N2™ suite of DNS-based applications includes N2 ThreatAvert, N2 Secure Consumer and N2 Reach to provide a strong cybersecurity foundation for CSPs to keep networks and subscribers protected from emerging cyberthreats like ransomware, phishing, DDoS attacks and other desktop and mobile malware, and offers the ability to instantly notify subscribers when an infection has occurred. Malwarebytes, recently recognized in CRN’s top 100 security solutions as a leader in the “Endpoint Security” category, offers consumers and businesses a fast and easy way to remove both known and unknown, or previously unidentified threats. In addition to the combined product offering now available to service providers, Nominum and Malwarebytes will collaborate through close sharing of research and insights from both companies’ expert data science teams.

“When a subscriber has an infected device, they are nearly four times as likely to call their service provider’s help desk than a non-infected subscriber and nine times as likely to churn off the service provider’s network.  More so than ever before, it is important for CSPs to proactively protect their networks and subscribers, provide personalized security notifications and to offer subscribers an easy and effective way to perform a fast “fix,” said Gary Messiana, CEO of Nominum. “The powerful combination of Nominum and Malwarebytes allows CSPs to turn ordinarily costly support issues into a hands-off revenue-generating opportunity by allowing CSPs to cost-effectively identify cyberthreats, notify subscribers and offer them easy remediation.”

“Companies and Internet users of all kinds are faced with the risk of new cyberthreats every day,” said Marcin Kleczynski, CEO of Malwarebytes. “Service providers are no exception, which also puts their subscribers at risk. With our new partnership with Nominum, CSPs and their subscribers can now rest easy that any malicious actors that end up on their systems can be easily remediated. This new partnership will also serve as an incredible asset to both companies’ threat intelligence. Together, we will have even greater insight into the threat landscape, enabling us to continue to protect consumers and businesses from the most dangerous cyberthreats.”

The financial damage caused by widespread cyberattacks is on the rise. Cybersecurity Ventures predicts global annual cybercrime costs will grow from $3 trillion in 2015 to $6 trillion annually by 2021, with global spending on cybersecurity products and services projected to exceed $1 trillion by 2021.[1] As cited in the Nominum Data Science and Security Report Fall 2016, ransomware is one of the fastest growing types of cyberthreats because of its speed and efficiency in turning virtual assets into real money. Locky, which possesses 17 percent of the ransomware market, infects roughly 90,000 devices daily around the world, with average payouts totaling $300 to $600 for each instance.[2]

Nominum N2: Protect, Secure and Notify for a Better Subscriber Experience
The Nominum N2 product suite is designed to optimize and secure subscribers’ online activities through robust DNS-based network protection, subscriber/device security and personalized notifications when a breach occurs—delivering a closed loop security experience. Through the combination of Nominum’s industry-leading Vantio™ CacheServe unified DNS platform and N2, CSPs strengthen their competitive advantage, accelerate revenue growth and increase brand loyalty. The full product suite includes:

·         Vantio CacheServe—Offers high network availability and low latency for CSP networks.
·         N2 ThreatAvert—Proactively protects CSP networks from cyberthreats with accurate, adaptive and automated technology.
·         N2 Secure Consumer—Provides consumers with personalized internet safety solutions such as parental controls, and proactively protects households from malware, ransomware and phishing attacks.
·         N2 Reach—In-browser subscriber communications and campaign management platform that is proven to be more effective than email, direct mail, phone calls or text.

Malwarebytes Closes the Security Loop for Subscribers

Malwarebytes empowers people to protect themselves against advanced threats with Malwarebytes 3.0. The solution replaces antivirus with superior technology designed to block malware, ransomware, exploits, and other advanced threats that antivirus isn’t smart enough to stop. Malwarebytes 3.0 is the first of its kind, employing four independent technology modules—anti-malware, anti-ransomware, anti-exploit, and malicious website protection—to block and remove both known and unknown threats. The anti-ransomware and anti-exploit modules employ signature-less technology so users are protected from advanced threats that are not yet known to traditional antivirus research labs.

Malwarebytes pieces together threat traces and automatically remediates compromised systems. This comprehensive approach to remediation helps eliminate the possibility of new cyberattacks or lateral movements that capitalize on leftover malware traces.

For the LATEST tech updates,
FOLLOW us on our Twitter
LIKE us on our FaceBook
SUBSCRIBE to us on our YouTube Channel!
    Blogger Comment
    Facebook Comment