SOURCE: DigitalStakeout

May 12, 2008 07:00 ET

DigitalStakeout and Support Intelligence Partner to Provide Comprehensive Real-Time Threat Monitoring and Security Event Management

ATLANTA, GA and SAN FRANCISCO, CA--(Marketwire - May 12, 2008) - DigitalStakeout, a leading innovator and source of breakthrough Security Information and Event Management (SIEM) solutions, today announced that it has agreed to an original equipment manufacturing (OEM) agreement with Support Intelligence. As part of this agreement, DigitalStakeout has developed an integrated appliance with Threat Aware™ for the Support Intelligence IP Query and React Services.

"We are excited to join in partnership with DigitalStakeout to deliver the most advanced and comprehensive real-time threat monitoring and security event management," said Rick Wesson, CEO of Support Intelligence. "Historical defense-in-depth frameworks are inward-looking and can easily miss threats. The integration and correlation of Support Intelligence's global threat intelligence with DigitalStakeout's best-in-class SIEM lets enterprise and public sector organizations re-think their business-centric security mission challenge and transform their security posture to provide 'defense in dimension' in a truly comprehensive and holistic way."

"This precedent setting agreement is indicative of DigitalStakeout's leadership. It adds to our momentum and demonstrates our strength as a real innovator of SIEM," said Adam Mikrut, president and CEO of DigitalStakeout.

Mikrut adds, "The combination of DigitalStakeout's SIEM and Support Intelligence's collective network intelligence provides sustained and adaptive security to meet the security mission head-on and address threats and opportunities at the speed of change."

About DigitalStakeout

Formed in 2004, as the industry's first trusted IBM Tivoli Security Operations Manager integration expert, DigitalStakeout solutions validate security posture, deliver a true NOC/SOC operational integration, and enable service providers to deliver multi-tenant managed security services.

DigitalStakeout's flagship product is a real-time security information and event management (SIEM) appliance preconfigured and designed to provide immediate out-of-the-box benefits to improve the effectiveness and efficiency of any security operations and risk management program.

DigitalStakeout's SIEM appliance centralizes, correlates, and stores security-related data from throughout the IT infrastructure, to provide a security team with immediate actionable security information. Coupled with patent-pending Threat Aware™, the security industry's first and only SIEM product which incorporates real-time global threat intelligence data into its event correlation engine and vulnerability correlation engine, DigitalStakeout SIEM empowers organizations to reduce risk, reduce security vulnerabilities exposures, and accelerate incident analysis and response times like no other SIEM solution.

DigitalStakeout SIEM appliance provides a holistic security dashboard with integrated one-click investigation tools, security-oriented ticketing system, and comprehensive compliance reporting for PCI, SOX, FISMA, HIPAA, GLBA compliance standards.

DigitalStakeout is headquartered in Atlanta, Georgia. For more information, visit the company's website at www.digitalstakeout.com or call 1-800-840-6435.

About Support Intelligence

Support Intelligence is a network security company located in San Francisco, California. The company was founded in 2006 on the premise that malicious network activity can best be identified and controlled through collective network intelligence gained from many sources across the Internet. Modern machine learning algorithms can then be applied to large volumes of aggregated traffic data to specify existing and potential threats and correlate them to the protected network.

Support Intelligence security solutions protect clients' data and privacy by keeping their networks clean, secure, and free of compromised hosts. The highly reliable, actionable information on malicious network activity takes into account the highly distributed nature of internet abuse in all its forms, including botnets, spam, viruses, worms, denial of service attacks, insecure web servers, open proxies, open relays, irc abuse, name server abuse, and others. Without this collective intelligence view of the protected network, its security mechanisms will have limited visibility and large gaps in threat awareness.

Contact Information

  • Media Contact:
    Shelli Ryan
    APR
    Ad Hoc Communication Resources, LLC
    (For DigitalStakeout)
    402-572-6510