Triumfant Launches its First Monitored Service Solution for Advanced Malware Detection and Remediation

Editor’s note: I have meant to get our readers an update on Triumfant for quite a while. I am very proud to be an advisor to John Prisco and believe their approach to automatically discovering attacks (and even misuse) on computers is one every enterprise should evaluate. The news below makes it even easier to leverage the powerful comprehensive solutions Triumfant brings.- bg

Comprehensive Solution Combines Expert Malware Analysis and Remediation with Remote Monitoring Service to Help Organizations Quickly Detect & Remediate Against Cyber Attacks

ROCKVILLE, Md., May 8, 2013 /PRNewswire/ – Triumfant, creator of patented software that automatically discovers, analyzes and remediates advanced malware attacks on computers, today launched its first ever Monitored Service Solution offering. The new solution combines Triumfant’s unique, patented malware detection software with the expertise necessary to allow organizations to quickly review and react to suspicious changes in their computing environments. Offered to customers with a remote monitoring service, Triumfant’s software discovers zero-day malware and targeted, advanced cyber security attacks within minutes rather than months.

With this comprehensive monitored service that leverages anomaly detection and patented analytics, Triumfant collects all malicious activity on the endpoint and provides a detailed analysis leading to remediation. Triumfant detects these attacks with tools that identify the affected files, registry keys, processes, and other related services.

“Triumfant’s unique ability to recognize attacks that evade traditional endpoint protections without the need for prior knowledge such as signatures provides unmatched defenses against today’s most sophisticated cyber attacks,” said John Prisco, President and CEO of Triumfant. “As malicious threats against the endpoint continue to grow in volume, sophistication and complexity, we must enable our customers to quickly and easily detect and remediate these advanced malware attacks. We believe our new monitored service offering is a great way for our customers to do just that, with the added expertise of our team to guide them every step of the way.”

Other features of Triumfant’s Monitored Service Solution include:

  • Advanced Verification: Offers verification of customer policies with respect to popular, but sometimes unauthorized applications such as iTunes, RealPlayer, Toolbars, and many more.
  • Automated Analysis: Allows for intricate analysis of the state of every computer in the monitored population on a daily basis. This analysis will identify, classify, and characterize any unusual changes in machine states.
  • Recognition Filters: Develops necessary recognition filters to automate remediation of zero day malware.
  • Management: Installation, verification, operation, and maintenance of the Triumfant malware detection solution is provided with each platform.
  • Automated Alerts: Syslogs, emails, trouble tickets, and other notification tools are provided for the detection of high priority security incidents such as zero-day malware or other advanced exploits.

Added Prisco, “Unlike other anti-malware solutions available today, Triumfant takes innovation a step further by building sophisticated, situational remediation that ends the attack and repairs all of the collateral damage to the affected machine. This unique combination of daily monitoring by our expert staff using our state-of-the-art malware detection software technology closes significant gaps in endpoint security and solves the equation for comprehensive, successful protection.”

Available immediately, Triumfant’s Monitored Service Offering is free for download on:

About Triumfant

Triumfant leverages patented analytics to detect, analyze and remediate the malicious attacks that evade traditional endpoint protection solutions such as the Advanced Persistent ThreatZero Day Attacks, targeted attacks, and rootkits. Triumfant automates the process of building a contextual and surgical remediation that addresses the malware and all of the associated collateral damage. Endpoints go from infection to remediation in five minutes without the need to reboot or re-image.

Triumfant uses these same analytics to continually enforce security configurations and policies, ensuring that organizations start every day with their endpoints secure and audit ready. Enforce FDCC Compliance with our NIST SCAP Validated tool and see how Triumfant is helping agencies realize the SCAP vision of security automation.

Please visit us at:
Follow Triumfant on Twitter and YouTube.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.


Recent Research

Tech Firms Seeking To Serve Federal Missions: Here is how to follow the money

Creating The New Cyber Warrior: Eight South Carolina Universities Compete

Mobile Gamers: Fun-Seeking but Fickle

Update from DIA CTO, CIO and Chief Engineer on ICITE and Enterprise Apps

Pew Report: Increasing Technology Use among Seniors

Finding The Elusive Data Scientist In The Federal Space

DoD Public And Private Cloud Mandates: And insights from a deployed communications professional on why it matters

Intel CEO Brian Krzanich and Cloudera CSO Mike Olson on Intel and Cloudera’s Technology Collaboration

Watch For More Product Feature Enhancements for Actifio Following $100M Funding Round

Navy Information Dominance Corps: IT still searching for the right governance model

DISA Provides A milCloud Overview: Looks like progress, but watch for two big risks

Innovators, Integrators and Tech Vendors: Here is what the government hopes they will buy from you in 2015

About Bob Gourley

Bob Gourley is the publisher of and and the new analysis focused Analyst One Bob's background is as an all source intelligence analyst and an enterprise CTO. Find him on Twitter at @BobGourley