Idappcom and Emerging Threats sign agreement

Idappcom and Emerging Threats sign agreement

Idappcom customers now have access to the industry’s most comprehensive and up to date library of security rules following the signing of an agreement enabling the company to offer its own extensive Snort based rule-set together with that of Emerging Threat’s global intelligence database.

Idappcom, the UK’s leading provider of network threat assessment tools and associated remediation services, has announced a strategic alliance with Emerging Threats, a major US based provider of commercial and open source threat intelligence now wholly owned by Proofpoint Inc. Under the agreement Idappcom will be able to offer network security managers access to the industry’s most extensive database of security rules for maximum protection from the latest exploits and malware threats.

Idappcom’s library of approaching 11,000 security rules is used by many of the major security vendors as well as global organisations to maintain their Snort based devices at optimum detection and protection levels. Updated monthly Idappcom’s rules target live, real-world exploit traffic and are available on subscription as a standalone service or as part of the company’s threat assessment and rule management toolbox.

Emerging Threats has built its own extensive database of rules (Proofpoint ET Pro) based on information gathered from its global threat intelligence infrastructure, able to recognise and protect systems against known external and internal malware attacks. The combined Idappcom and ETPro rule-set will provide security managers with access to approaching 30,000 rules needed to maintain optimum network protection against all the latest attack vectors.

Commenting on the agreement Idappcom’s CEO, Ray Bryant said:

“The combination of our own and ET’s rules provides our customers with a unique, one-stop, resource that now covers both the malware delivery methodology and the actual malicious payloads. This means that network sensor rules can be routinely updated to support a defence-in-depth approach needed to prevent the latest exploit traffic by-passing mis-configured firewalls and IPS devices and detect when critical servers have been compromised, before any malware can be unpacked and activated.”

Both sets of rules form part of Idappcom’s integrated threat assessment and remediation toolbox, which includes its powerful rule management and control software, Easy Rules Manager (ERM). ERM is used to store, compare, select, edit and deploy Snort and Suricata compatible rules, from multiple sources, via a centralised management dashboard. This helps to avoid duplication and reduce the volume of false positives that typically follow a vendor’s automated signature update.

Combined with Idappcom’s threat assessment and auditing tool Traffic IQ, ERM enables security managers to routinely test that all their network sensors are able to recognise and respond to the latest attack traffic and then apply only the necessary rule updates, where needed, using a test-remediate-test, closed-loop methodology.

[su_button url=”http://idappcom.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]Click here to find out more about Idappcom[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

ASSA

ASSA ABLOY signs definitive agreement to acquire Arran Isle

ASSA ABLOY has signed a definitive agreement to acquire Arran Isle, a designer, manufacturer and distributor of door and window

Dimension Data and Cisco announce co-innovation partnership

Dimension Data and Cisco have announced a new co-innovation agreement, to develop a deeper collaboration environment and framework.
Dimension Data and Cisco

Dimension Data and Cisco announce co-innovation partnership

Dimension Data and Cisco have announced a new co-innovation agreement, to develop a deeper collaboration environment and framework.
ASSA ABLOY

ASSA ABLOY acquires KEYper systems in the US

ASSA ABLOY has signed an agreement to acquire KEYper Systems with a strong presence in the automotive segment – becoming a separate business unit of TRAKA.

ASSA ABLOY acquires KEYper systems in the US

ASSA ABLOY has signed an agreement to acquire KEYper Systems with a strong presence in the automotive segment – becoming a separate business unit of TRAKA.
Sepura

Sepura and Sintel Italia sign long term distribution agreement

Sintel Italia has a distribution agreement with Sepura, ensuring that Sintel will supply Sepura’s TETRA terminals into the Italian communications market.

Sepura and Sintel Italia sign long term distribution agreement

Sintel Italia has a distribution agreement with Sepura, ensuring that Sintel will supply Sepura’s TETRA terminals into the Italian communications market.
Scroll to Top