+1.813.321.0987

BUSINESS PROTECT

THREAT DATA

Protection Against Malware and Ransomware

Small Business Protection

Our Business Protect threat data feeds offer your customers and networks a highly reliable layer of protection against ransomware and malware infections.

Most importantly, the data in our feeds is formatted for ease of use, compatible with the most common security platforms and software – no API required – and:

– Our database is updated constantly by crawlers in the cloud

– Each indicator is verified daily

– DNS names are resolved 4-6 times a day

– Newly discovered URLs are processed within an hour.

malware infections

Package Details

malware infections
malware infections
malware infections

Contents

Malware URL data for rolling 9-month period, to maximize active threat coverage.

Hashes to verify the integrity of the downloaded data feed.

Add-on:

1) For an additional fee, you can add our DNS RPZ Firewall. It includes 5 separate zones: Anti-mining, C2s, DGAs, Malware, Phishing

Formats

ClamAV Virus DB
pfBlockerNG
pfSense
Postfix MTA
SpamAssassin
SquidGuard Block List
Squid Web Proxy

Features

Data Feeds
Free 7-day trial
Hourly updates
Unlimited downloads
Access to the CyberChef tool set

Subscription Options
Unlimited-use commercial license
Monthly or 1-year subscriptions

Learn More

 
 
 
 
Watch our Business Protect evaluation orientation to learn more about the feeds and subscription features.

About Our Data

Malware Patrol’s threat data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. All the data is carefully inspected. As a result, our feeds contain thoroughly vetted indicators sourced from the real world.

Because security budgets are usually limited, it is important to rely on a data source that provides coverage for the current malicious campaigns and threats that directly affect your company and your customers, maintaining a high level of security but using the minimum amount of resources.

 

How We Can Help

As a SMB, MSP, MSSP, ISP or similar company, there are many ways to use our data to protect your assets, employees and networks, as well as your customers:

  • Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers
  • Prevent the exfiltration of sensitive data and intellectual property from infected machines
  • Detect malicious content hosted on your networks and servers
  • Improve incident response and forensic capabilities by providing your teams with meaningful information about threats
  • Grow your business by providing industry-leading threat data as a premium service to your customers.
squid logo

Squid3 Web Proxy Configuration Guide

Squid is a proxy for the web that provides extensive access control lists, reduces bandwidth consumption and improves response times by caching and...
AWS s3 buckets

Accessing threat data on AWS S3 buckets

Malware Patrol provides some of its threat data feeds via Amazon / AWS S3 buckets. Among the feeds are the "Malware Samples (Binaries)"...
bind9

BIND9 Configuration Guide

Bind is the world’s most used DNS server. Keep reading to learn how to configure Bind9 to work with Malware Patrol's data. Getting Started...
SpamAssassin

SpamAssassin Configuration Guide

Malware Patrol provides block lists compatible with SpamAssassin.   "Apache SpamAssassin is the #1 Open Source anti-spam platform...

Cisco ASA FirePOWER Configuration Guide

“With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and...
pfsense logo

pfBlockerNG Configuration Guide

Malware Patrol provides block lists compatible with pfBlockerNG, a package for pfSense version 2.x that allows the usage of custom block...
clamAV

Clam AV Software Configuration Guide

“Clam AV is an open source ant-virus engine for detecting trojans, viruses, malware & other malicious threats.” Malware Patrol provides...
pfsense logo

pfSense Configuration Guide

pfSense software is a free, open source customized distribution of FreeBSD specifically tailored for use as a firewall and router that is entirely...
Palo Alto Threat Exchange

MineMeld Configuration Guide

Palo Alto MineMeld is an “extensible Threat Intelligence processing framework and the ‘multi-tool’ of threat indicator feeds. Based on...
RPZ DNS

DNS RPZ Firewall Configuration Guide

BIND is the world’s most used DNS server and can be configured as a DNS Firewall using RPZ files (DNS RPZ). Response Policy Zone (RPZ)...
microsoft bitlocker

Infosec Articles (7/13/19 – 7/27/19)

There's a growing concern over what is thought to be a regrouping of the GandCrab ransomware developers to distribute what is being called...