<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1076912843267184&amp;ev=PageView&amp;noscript=1">
|

Meet the Latest Update to ReversingLabs Elastic Threat Infrastructure

Our customers rely on ReversingLabs Elastic Threat Infrastructure (TitaniumScale) to quickly scan large volumes of files to identify malware and goodware. Here, we break down the solution’s newest improvements. 

TitaniumScale-new-features-2 (1)

ReversingLabs is proud to announce new and enhanced features for ReversingLabs Elastic Threat Infrastructure (TitaniumScale). This product helps enterprises assess millions of files per day to quickly find and prioritize threats for remediation. It uses unique ReversingLabs File Decomposition Technology to extract detailed metadata, add global reputation context and classify threats, and automatically acquires files by integrating with email gateways, intrusion detection systems, firewalls and other devices. Results feed into analytics platforms to provide visibility and enriched data for remediation and advanced hunting.

Our goal is for ReversingLabs Elastic Threat Infrastructure to provide value in a number of ways for our customers. This value is seen in how our solution reduces cyber risks while ensuring data and file privacy, benefiting the businesses we work with. Additionally, our customers are able to reduce operational workload and tool costs with the help of this solution. And equally important, practitioners benefit from using our solution's advanced technology, which reduces mean time to detect or discover (MTTD) by prioritizing malicious files for triage. 

New, Improved Tech that Drives Security Operations Forward

In this enhanced version of ReversingLabs Elastic Threat Infrastructure, several updates have been made to improve the overall quality and efficiency of our platform. Bigger changes to our solution, such as being able to search for malware in Microsoft SharePoint Online, along with user interface improvements, will yield positive changes for our customers. Below, we break down these major product updates for you. 

Automatically Detect Malware in Microsoft SharePoint Online (SaaS) 

ReversingLabs Elastic Threat Infrastructure is expanding its support of popular cloud storage platforms. Currently, the product supports file analysis from various cloud storage platforms including Azure Data Lake, Amazon Web Services (AWS) S3 and OneDrive.  

Our enhanced Elastic Threat Infrastructure release offers the capability to scan Microsoft SharePoint Online (SaaS) cloud storage for malicious files. The solution automatically scans SharePoint Online storage and analyzes files in real-time, providing file classification reports. This was an essential enhancement to make, considering that SharePoint online was one of the top applications for malware downloads in May 2022, according to the Netskope Threat Labs Report.   

This enhancement helps our customers in several ways. Organizations have to process millions of files daily. And as a result, stretched SOC teams are tasked with delivering timely file analysis and threat detection. Our product automatically scans high-volume file repositories and reduces time spent on manual analysis, bringing ease to SOC teams. 

Even with an emphasis on security and built-in malware protection, cloud storage platforms are targets for cyber criminals. However, cloud storage threat detection solutions can provide too many false alerts, overwhelming threat response teams. They can also miss malware hidden in large, complex files. ReversingLabs Elastic Threat Infrastructure supplements existing cloud storage threat detection, finding threats that other solutions miss.

Redesigned Appliance Release Updates 

A new enhancement of ReversingLabs Elastic Threat Infrastructure includes redesigned appliance release updates, which provide greater efficiency within administrative workflows. This allows SOC Administrators more granular control over appliance updates after a new release. Also, users will now have the flexibility to choose which update binaries to download or delete from the solution’s system.

Organizations with private, air-gapped environments also benefit from this enhanced functionality. This is because SOC Administrators are able to manually upload and update ReversingLabs provided binaries.  

User Interface Updates

To improve the user experience and improve workflows, this release also includes a number of user interface updates such as more uniform navigation, organization of menus and redesigned configuration sections. This enables users to navigate to tabs and complete tasks more quickly and efficiently. 

Going Above and Beyond Our Customers’ Expectations

It’s clear to us at ReversingLabs that there is no true limit to improving solutions for our customers. This is exactly what we will continue to do with our ReversingLabs Elastic Threat Infrastructure solution, so that organizations can continue to have robust programs that can help mitigate today’s most serious malware threats.   

About ReversingLabs

ReversingLabs is the leading provider of explainable threat intelligence solutions that shed the necessary light on complex file-based threats for enterprises stretched for time and expertise. Its hybrid-cloud Titanium Platform enables digital business resiliency, protects against new modern architecture exposures, enables software risk verification, and automates manual SOC processes with a transparency that arms analysts to confidently take action.

ReversingLabs is used by the world’s most advanced security vendors and deployed across all industries searching for a more intelligent way to get at the root of the web, mobile, email, cloud, app development and supply chain threat problem, of which files and objects have become major risk contributors.

More Blog Posts

    Special Reports

    Latest Blog Posts

    Securing Medical Devices with SBOMs Securing Medical Devices with SBOMs

    Conversations About Threat Hunting and Software Supply Chain Security

    Reproducible Builds: Graduate Your Software Supply Chain Security Reproducible Builds: Graduate Your Software Supply Chain Security

    Glassboard conversations with ReversingLabs Field CISO Matt Rose

    Software Package Deconstruction: Video Conferencing Software Software Package Deconstruction: Video Conferencing Software

    Analyzing Risks To Your Software Supply Chain