Lastline: Stop Evasive Malware, Persistent Threats and Zero Days

Lastline Enterprise and Analyst deliver protection against targeted attacks, advanced persistent threats (APTs), zero-day exploits, and other advanced malware that bypass traditional signature-based controls and sandbox-based analysis systems.


Easy to deploy and simple to administer, Lastline’s solutions are universal to Web, email, file, network traffic and analysis of Android applications.

Lastline supports deployments on virtualized environments that are running on VMware ESX servers. Available as an on-premise or hosted offering, Lastline Enterprise is used to detect advanced malware in the network – analyzing individual processor instructions and memory accesses. The solution enables users to bypass the upfront costs associated with proprietary hardware, and it is easily integrated into an organization’s virtual and physical distributed network.

Lastline analyzes both the objects that enter a network and the traffic being generated by the internal hosts to provide the network security administrator the most up-to-date view of internal malware infections and attempted targeted attacks.

Lastline launched in 2011 to deliver a comprehensive security platform to detect, stop, and manage targeted attacks, advanced persistent threats (APTs), zero-day exploits, and evasive malware designed to bypass traditional security products. Founded by world-renowned security researchers – who have been analyzing next generation threats over the past decade – the company provides high-resolution and real-time malware analysis of network, email, web, file and mobile attacks. Lastline’s solutions are cost effective and can be easily deployed as an on-premise software and cloud-based service throughout an organization’s environment.

Founders Christopher Kruegel, Giovanni Vigna and Engin Kirda are also known for creating Anubis and Wepawet, which provide free, advanced malware analysis services. Lastline Analyst enables users to upload files and URLs for advanced malware analysis.

For more on Lastline see:

Related Posts:

Cybersecurity: Is AI Ready for Primetime In Cyber Defense?

Walking the tightrope between best practice and negligence – things to consider when responding to targeted or advanced persistent threats

Track the most disruptive technologies by diving into our categorized index:

Artificial Intelligence Companies | Big Data Companies | Business Intelligence Companies | Cybersecurity Companies | Cloud Computing Companies | Collaborative Tool Companies | Infrastructure Companies | IoT Companies | Mobile Companies | Robotics Companies | Services Companies | Tech Titans | VC, PE and Finance Companies

What do you think?

As We May Think: Vannevar Bush’s 1945 Essay still provides great motivational concepts for advancing science

Alteryx: Specializing in Data Blending and Analytics