LookingGlass ScoutShield
1.00

Categories

Problems that solves

No IT security guidelines

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Malware infection via Internet, email, storage devices

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

Non-compliant with IT security requirements

Customer fraud

Values

Reduce Costs

Ensure Security and Business Continuity

Ensure Compliance

LookingGlass ScoutShield

LookingGlass ScoutShield is a high-assurance, low-touch security appliance designed to work with firewalls to identify and block phishing, malware, and malicious Command-and-Control (C2) domains.

Description

ScoutShield Threat Intelligence Gateway is a high-assurance, low-touch security appliance designed to work with firewalls to identify and block phishing, malware, and malicious Command-and-Control (C2) domains – disrupting or stopping these threats.

The ScoutShield solution ingests LookingGlass Automated Data Services’ machine-readable threat intelligence to automatically block known phishing URLs, malicious URLs, and malicious C2 Domains.

  • Malicious C2 Domains Feed - Daily updated blacklist of all known C2 botnet servers
  • Phishing URL Feed - Real-time feed of global phishing URLs
  • Malicious URL Feed - Real-time feed of global malicious URLs

ScoutShield’s automated response mechanism allows organizations to respond more efficiently and effectively to threats, so you can combat data breaches, ransomware, and stolen credentials in real-time. Using ScoutShield’s multiple Monitoring and Reporting Dashboards enable your security team to easily determine the effectiveness of policy enforcement, the health of the entire system, and if threat intelligence rule sets have been deployed successfully.

Use ScoutShield to:

  • Protect against known malicious web pages and phishing attacks with 99.99% accuracy
  • Prevent infected devices from communicating with C2 servers automatically
  • Enable your security analysts to mitigate threats in real-time, increasing productivity
  • Deliver digestible insights on using its multiple dashboards: Appliance, System, Threat Intelligence,    
    and Threat Mitigation.
  • Alert your organization of compromises on the network