The Last Line of Defense - http://tllod.com

admin research
I am excited to announce that the website of our start-up company LastLine, Inc., is now live at http://www.tllod.com. The team behind LastLine is composed of people you know from the International Secure Systems Lab (http://iseclab.org), we are coming from the University of California, Santa Barbara, the Vienna University of Technology (Austria), Eurecom (France), and Ruhr-University Bochum (Germany). We all have extensive expertise in malware analysis and malware countermeasures (see our list of publications) and you might know tools like Anubis or Wepawet that have been developed by us.

LastLine, Inc., provides protection technology that is complementary to existing anti-virus software and firewalls. Our approach is based on cyber crime intelligence that we gather by analyzing millions of suspicious URLs and binaries each day. More precisely, using our advanced malware analysis tools, we pinpoint the exploit servers that are behind drive-by exploits campaigns and the command and control server that manage botnets. These servers constitute the malicious infrastructure that is used by cyber criminals to carry out their attacks.

One of the first product we offer is llweb, a tool that analyzes web sites for the presence of malicious code, such as drive-by download exploits. llweb was developed by the creators of Wepawet and you can find out more about the tool at http://tllod.com/products/llweb. We also offer several other tools and services: llmon is a service that helps organizations to determine if their hosts are used to deliver or control malware. We continuously monitor whether a customer's assets participate in malicious activities, and if so, we provide detailed and early warning so that proper mitigation steps can be initiated. llmon was developed by some of the creators of FIRE. Furthermore, we provide access to the list of IP addresses, domains, and URLs that we identify to be associated with malicious activity on the Internet. Customers can obtain continuously-updated intelligence, which can be leveraged internally to identify compromised hosts or configure network access control mechanisms. You can find more about our products at http://tllod.com/what.

Trackbacks

    No Trackbacks

Comments

Display comments as (Linear | Threaded)

  1. najmi says:

    Congratulations, way to go!

  2. Andy says:

    Congrats! Looking forward to the product offerings of LastLine!

  3. med says:

    How much, and how do you charge for your services?

  4. microsoft dynamics crm says:

    Cyber crime is on the rise and many fresh cases are coming up day by day.We really need a good software which will be capable of fighting all the malicious malware,spyware and other threats in the PC.I recently attended the seminar on cyber crime which was attended by many top executives of well known organization and was very pleased to see the effort they are putting on preventing these crimes.May be in a future we will get full proof security.finger crossed

  5. Snapfish Coupon Code says:

    Thank you, you shared so great information...

  6. survival seed bank says:

    What can be done to your data bank information if your security has already been compromised? Is there anyway to ensure the survival of all our vital data after a large scale virus attack?

  7. graham says:

    This post is very helpful. Thanks

  8. tips cara cepat hamil says:

    I am very glad I can comment on this page

    thanks :)

  9. uk assignment says:

    I appreciate this blog, that was the good post.

  10. Supplements in Australia says:

    What you can do to your info financial institution facts in case your stability had been affected? Perhaps there is at any rate to guarantee the success off your important info after a large range computer virus assault?

  11. John says:

    What you can do to your information bank info but if your protection had been sacrificed? Possibly there is in any case to guarantee the tactical off your crucial information from a huge range virus episode?

  12. research paper editng says:

    Well that's amazing article! I really enjoyed this article.


Add Comment


E-Mail addresses will not be displayed and will only be used for E-Mail notifications

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA 1CAPTCHA 2CAPTCHA 3CAPTCHA 4CAPTCHA 5