Triumfant Ends the Global Malware Endpoint Epidemic With the Launch of AtomicEye

Unmatched Rapid Detection and Response Capabilities Prevent Cyber Criminals From Leaving With Valuable Assets Rather Than Stopping Adversaries From Getting in


ROCKVILLE, MD--(Marketwired - Mar 3, 2015) - Enterprise endpoint security provider Triumfant, today released AtomicEye, the latest version of its endpoint security agent for Windows-based and Mac OS X environments. AtomicEye's central purpose is to ensure that once inside a company's or government agency's systems, no attacker can leave with proprietary information, damage to enterprise systems is minimized, and critical assets are secured. When high-value assets are at risk, instant detection and rapid response is critical. AtomicEye achieves this by continuously scanning more machine assets than any other endpoint security product -- more than 700,000 assets per protected machine.

Cyber criminals are more persistent and creative than ever, corrupting government and corporate IT systems -- resulting in great economic damage to corporations, government agencies, and the global economy. An alarming 95 percent1 of all U.S. enterprises claim that they are being successfully attacked today. Those same organizations report an average 200 day latency period between when an attack has occurred and when the breach is discovered -- allowing ample time for attackers to extract huge amounts of data as seen with the targeted attacks at Sony, Home Depot and Target. 

"I can think of no greater technological failure in the last generation than the inability of the security industry to stop cyber criminals from wreaking havoc on the world's companies and governments -- it's embarrassing," said John Prisco, CEO of Triumfant, Inc. "Companies remain so focused on the perimeter they have little idea of what's going on inside the network and on their machines. Triumfant's AtomicEye operates under the assumption that all of the cyber criminals will succeed in breaching systems and that relying on human oversight, analysis, and action is error prone and unnecessary." 

An epidemic is at hand and the magnitude of these security failings requires a completely new approach: one with a greater dependency on immediate detection and automatic remediation based on deep analytics and a sub-atomic view into machine assets and change behaviors. 

Triumfant's AtomicEye requires little oversight, offers continuous protection and most importantly, prevents damage, loss and destruction that can cripple a business. AtomicEye secures information on end-point computers and systems in three ways:

  • Instant Detection. Triumfant's AtomicEye assesses more than 700,000 state attributes on every protected machine -- a sub-atomic view that allows Triumfant to see an almost infinite set of machine behaviors and trend anomalies that indicate the presence of advanced malware. This continuous monitoring permits an unprecedented capacity to detect with certainty, in real-time, and at the point of infiltration, persistent or volatile malware.
  • Rapid Response. Once an endpoint is breached, the machine is locked down. No signatures or any other form of prior knowledge is needed. As soon as a change occurs a remediation plan is set in motion, making it impossible for damage to be done and/or assets to be compromised. 
  • Automated Remediation. Within minutes of an attack, Triumfant AtomicEye goes to work, automatically repairing any damage caused and restoring the compromised machine(s) back to its original, clean state. With AtomicEye there are no interruptions or downtime to the business and no human action or interpretation is required.

"The security industry has tried many approaches to preventing malware over the years, and some have worked better than others. By now, everyone should realize that signature-based approaches have limited value," said Adrian Sanabria, Senior Security Analyst at 451 Research. "Innovations like Triumfant's memory scanning approach are an important and significant step forward in fighting the battle where it occurs -- on the endpoint. Many current technologies address threats directly, taking a single step to prevent an attack. These are easily leapfrogged by the attacker, and have limited long-term value. The industry desperately needs more approaches that address problems at the root, and will force attackers to spend significantly more time and effort to achieve their goals."

AtomicEye is available today. For more information, please see www.triumfant.com

About Triumfant
Triumfant provides continuous protection from advanced malware threats on the endpoint, stopping cyber criminals in their tracks. Offering the most advanced detection capabilities and featuring enhanced memory and Mac features, Triumfant ensures that once inside a company's or government agency's systems, no attacker can leave with proprietary information, damage to enterprise systems is minimized, and critical assets are secured. Triumfant stops a breach before it becomes a full-scale attack then automatically repairs the machine(s) and any collateral damage within minutes -- no human intervention or system downtime is required. When attacks occur, companies and government entities trust Triumfant to quickly recover and prevent loss. Visit www.triumfant.com 

1 Ponemon Institute's 2014 Cost of a Data Breach: Global Analysis.

Contact Information:

Media Contact:
April H. Burghardt