SOURCE: Triumfant

Triumfant

February 12, 2014 09:10 ET

Triumfant Combats Point-of-Sale Security Breaches in Under Five Minutes

Target Breach Has Endpoint Security Firm Seeing Record Demand for Its Rapid Detection and Remediation Solutions by Major Retailers

ROCKVILLE, MD--(Marketwired - Feb 12, 2014) - Triumfant, creator of patented software that automatically discovers, analyses and remediates advanced malware attacks on computers, servers and soon mobile devices, today announced that it is well suited to address Point-of-Sale (POS) intrusions similar to those experienced by Target, Neiman Marcus and other top retailers. As a result, Triumfant is seeing record demand for its malware detection and remediation software, as well as its patented approach to addressing in-memory based attacks, also known as Advanced Volatile Threats (AVTs). Inbound requests are up more than 300 percent since the rash of attacks against Target and others were announced.

POS terminals are the ultimate last line of defense for retailers, yet traditional defenses such as antivirus software and outdated compliance guidelines set by the Payment Card Industry (PCI) are no match for sophisticated cybercriminals. The FBI recently warned retailers that it has seen close to two dozen attacks similar to the Target breach occur in the past year and that future POS malware attacks are inevitable and on the rise. Worse yet, only 11 percent of businesses have adopted industry-standard security measures according to a recent report by Verizon Business Solutions and these best practices often fall short of what's needed to defeat sophisticated adversaries and aggressive hackers. 

With this growing threat, retailers must consider multi-faceted, defense-in-depth strategies that include network security measures and endpoint security on the checkout terminals themselves to ensure continuous monitoring of breaches and that the systems are audit-ready every day -- not once a month as the PCI Data Security Standards (DSS) dictate. Random Access Memory (RAM) scraping or memory-based attacks are on the rise as adversaries are becoming more sophisticated and are choosing secrecy and ephemerality over planting malware in a hard drive. These AVTs take place in a computer's RAM or other volatile memory and are difficult to detect because they are never stored to the hard disk. 

"Fighting the battle at the last line of defense, the endpoint, has never been truer than in today's retail environment," said John Prisco, CEO of Triumfant. "We've seen time and again, malware strategies that rely on prevention are doomed to fail. Checkout terminals must be equipped with rapid detection and response capabilities to ensure breaches don't become Advanced Persistent Threats. With Triumfant in place, retailers can stop the attack and interrupt the kill chain within minutes and before the adversary can retrieve sensitive information or intellectual property. Triumfant then continuously monitors machines, maintaining a dynamic understanding of organizational risk, putting the retailer in a perpetual state of compliance and audit readiness."

Triumfant's POS security solutions shrink the gap between detection and response, reducing the risk associated with malicious activity and non-compliance. Triumfant's rapid detection and real-time response capabilities are accomplished using patented, big data analytics without lockdown, forklift upgrades, signatures or prior knowledge. Combining granular scanning, change detection and patented analytics, Triumfant detects breaches at the point of infiltration, generates a comprehensive and actionable analysis within minutes of the attack, and builds a situational remediation that stops the breach and repairs primary and collateral damage to the machine. With Triumfant on the endpoint, retailers can recoup, or avoid altogether, the $11.5 million lost on average per incident to cybercrime each year. It is difficult to put a price on restoring consumer confidence and trust that their identity won't be stolen or credit cards compromised when shopping at a retailer's store. Using Triumfant, retailers won't have to.

About Triumfant
Triumfant leverages patented analytics to detect, analyze and remediate the malicious attacks that evade traditional endpoint protection solutions such as the Advanced Volatile Threat, Advanced Persistent Threat, zero-day attacks, targeted attacks and rootkits. Triumfant automates the process of building a contextual and surgical remediation that addresses the malware and all of the associated collateral damage. Endpoints go from infection to remediation in five minutes without the need to reboot or re-image. No signatures or prior knowledge of any kind are required to stop the adversary. Triumfant uses these same analytics to continually enforce security configurations and policies, ensuring that organizations start every day with their endpoints secure and audit ready. To learn more about the company go to: http://www.triumfant.com/default.asp or follow Triumfant on Twitter and YouTube.

Contact Information

  • Media Contact
    April H. Burghardt
    PR Consultant for Triumfant
    Email Contact
    646-246-0484