Adaptive Behavior-Based Malware Protection

Size: px
Start display at page:

Download "Adaptive Behavior-Based Malware Protection"

Transcription

1 WHITE PAPER: ENTERPRISE SECURITY Adaptive Behavior-Based Malware Protection Who should read this paper Enterprise Information Security executives and teams can use this document to understand a new behavior-based security technology that automatically identifies and blocks even highly obfuscated malicious code with no user intervention or meaningful impact on system performance.

2

3 Content Executive summary The new threat environment Malware s critical weakness and a new approach Inside SONAR Real-time behavior-based protection Classification of application behaviors Behavioral policy lockdown SONAR in action the Symantec advantage Take the next step

4 Executive summary A new generation of customized, tightly targeted, and byte-level obfuscated malicious code (malware) disguises its appearance to evade reactive security measures of all kinds, specifically signature-based antivirus solutions. But while each new instance in a malware "family" may appear different, its behavior can't be disguised. Symantec SONAR technology takes advantage of this weakness to create a new, final line of defense against even sophisticated, highly obfuscated malware. SONAR monitors every process running on a protected computer for patterns identified during an exhaustive, worldwide classification of application behaviors and then blocks or removes them in real time, without any user intervention, measurable performance impact, or meaningful risk of false alarms. Qualitatively different even from emulation and other behavior-based approaches, SONAR is already analyzing more than 50 million application instances every month, blocking more than 73,000 malicious files every day, and protecting more than 50 million enterprise and consumer systems worldwide. IT organizations should carefully consider upgrading their IT security solutions to include SONAR protection, and to enable SONAR protection if they are not already using it. The new threat environment As documented by the Symantec Internet Security Threat Report, 1 online malicious code malware is undergoing a qualitative change. The first wave of malware designed to steal financial assets, intellectual property, or sensitive information broadly distributed a few threats to compromise the most vulnerable among millions of targets. But a second generation of customized, precisely-targeted threats is a far greater challenge to today s security technologies and the businesses that depend on them. These new families of threats are cloned from established malware and then obfuscated at the byte level using automated tools. Hacker tools that disguise malware from all signature-based antivirus solutions are billed as 100% FUD (for Fully UnDetectable ) crypters, and command premium prices in online criminal markets. Criminal organizations, political hactivists, and state-sponsored organizations use them to create new malware instances as needed to steal money and intellectual property, mislead users into purchasing useless or dangerous "FakeAV" software, infiltrate or compromise critical infrastructure, or disclose information they hope will embarrass their targets. New enterprise and consumer threats follow vectors including: Advanced Persistent Threats (APTs), remote-access Trojans, spyware, and keyloggers Social-engineering exploits disguised as antivirus software, key generators, and video codecs to trick users into installing malware Bot software and drive-by downloads that automatically add systems to botnets Non-process threats injected into running system processes to make removal difficult and risky Zero-day threats Drive-by downloads and web attacks that install malware without requiring any user action Malware designed to be buried silently in rootkits to evade detection Byte-level obfuscation or encryption disguises new malware variants from antivirus software that relies on signatures to recognize and block every newly-encrypted clone. Customized malware can easily reach its target often a single endpoint before security vendors can find it to create and distribute a signature. And customized threats are multiplying fast: every year, Symantec sees hundreds of millions of malware variants, and blocks billions of attacks. 1-Symantec Corporation. Symantec Internet Security Threat Report Volume 17. (Mountain View, CA. April, 2012). 1

5 Malware s critical weakness and a new approach The new generation of malware disguises its appearance to evade signature-based detection. But the goals of malware creators fraud, theft, vandalism, and defamation haven t changed. And so their new malware exhibits the same narrow range of behaviors as the old keyloggers and password stealers access and export information, spambots send , rogue antivirus programs pop up misleading messages, and so on. Unlike the tidal wave of unique signatures from customized malware, malicious behaviors are few in number, highly stable over time, and consistent within malware families. The behavioral consistency of malware is a weakness that Symantec has taken advantage of to create a new protection technology. SONAR Symantec Online Network for Advanced Response technology blocks and removes malware in real time, based on what it attempts to do, regardless of how well it is disguised. Built into Symantec Endpoint Protection 12.1 and Norton 360, and Norton Internet Security consumer products from 2010 onwards, SONAR uses real-time behavioral monitoring to block and disable even highly obfuscated malicious code with no user intervention of any kind. SONAR is the innermost of multiple layers of protection: signature-based antivirus delivers efficient, effective protection against widely distributed, routine threats. SONAR, working with and complementing Symantec engines like Network Intrusion Detection and Insight reputation-based security, creates a critical final line of defense against new malware aimed at business endpoints, desktops, and users. Now in its fourth generation, SONAR technology uses Proactive Threat Protection that has been completely redesigned from the earlier generation of behavioral detection featured in Symantec Endpoint Protection 11. Inside SONAR SONAR technology detects threats based on their behaviors, with no reliance on signatures. It is effective even against brand-new clones of sophisticated malware such as Duqu, StuxNet and Hydraq/Aurora, and malware-embedding rootkits from sources like TidServ and ZeroAccess. In order to minimize performance impacts on the system, definitions of suspect behaviors are created in offline labs using exhaustive machine and human analysis, and distributed through Symantec LiveUpdate. SONAR combines: Real-time behavioral monitoring of all processes running on a computer Exhaustive automated and human classification of behaviors Removal or blocking, depending on threat behavior and likely system impact Let s review the operation and advantages of each component: Real-time behavior-based protection SONAR monitors the behaviors of processes as they run, for example attempts to change a browser home page, install a browser toolbar, monitor keystrokes, and almost 1,400 others. It puts each behavior in full context by also considering process: Origin was the original file downloaded from a trusted site, copied from a network share, installed from portable media, etc.? Contents was the original file encrypted and packed and disguised using high-entropy encryption? 2 What Windows functions does it import? Was the code compiled using a commercial solution or one of the low-end, non-mainstream compilers hackers favor? Relationships has the process created any executables that were identified as malicious? 2-Robert Lyda and James Hamrock. Using Entropy Analysis to Find Encrypted and Packed Malware, IEEE Security and Privacy, volume 5 issue 2. (Piscataway, NJ: IEEE Educational Activities Department, March 2007). 2

6 The resulting inventory of behaviors, presented in full context, is ready for evaluation using classification rules developed in the laboratory and distributed through LiveUpdate. By monitoring processes in real time, SONAR catalogues application behavior including behavior of heavily obfuscated malware clones and even threats that have yet to be created. Context information helps the solution work even faster and suppress false alarms. Classification of application behaviors The large number of behaviors monitored by SONAR creates a broad statistical base for rules that distinguish malicious from benign processes but the quality and efficiency of the rules themselves are equally important. Rule-based solutions that attempt to evaluate processes on the fly within client systems pit quality and efficiency against one another: greater precision consumes more processing power; less performance degradation means higher risk of misses, false alarms, or both. SONAR takes a different approach, maximizing effectiveness without sacrificing productivity. Systems and experts analyze behaviors of application instances collected online hundreds of millions to date offline in Symantec laboratories, creating classification rules that client systems can apply with virtually no performance impact. Symantec has developed more than 1,000 such simple and compound rules; basic examples include: Signed by VeriSign (Good) Terminates Symantec process (Bad) Modifies Browser Home Page BUT Not Developed in Visual Basic (Good) Other rules classify code that reads or writes to sensitive areas of the registry, creates executables, modifies DNS settings, and much more. Collecting and analyzing all this information relies on unique Symantec strengths, including the world s largest repository of application instances and a network of hundreds of millions of listening posts distributed worldwide, 3 to deliver a constant supply of new instances. Two other strengths deserve special mention. First, the broad coverage and wide distribution of other Symantec security technologies provides context and analysis for SONAR classifications available from no other source including: Antivirus does this code create executables recognizable as viruses? Intrusion Prevention does this application show bot-like behaviors, or attempt to create bots? Reputation-based Security is the application classified as malicious by the advanced analytics of the Symantec Insight reputation system that calculates community reputation for all files? 4 Second, Symantec Technology and Security Response extends classification rules in useful ways, by: Identifying behavior sequences that define threat families, for example members of the PC Scout fake antivirus software family, all of which launch from the Temp folder, write AVE to the Windows Registry, create a hostinfo.txt file, and modify the Browser Home Page, in that order Reviewing and certifying machine-authored classification rules to categorize them into family groups that IT security administrators can better understand and use 3-Christian A. Christiansen, Chris Liebert, and Charles J. Kolodgy. Worldwide and U.S. Security Services Threat Intelligence Forecast: Out of the Basement and into the Clouds (Market Analysis). (Framingham, MA: IDC. November, 2011.) 4-For complete details on Symantec Insight, please review the companion White Paper, Turning the Tables on Malware: a Comprehensive Approach to Unique and Targeted Attacks. 3

7 Publishing malware descriptions that integrate information from SONAR, other Symantec protection technologies, and Symantec human intelligence see, for example, write-ups on RougueAV!gen20 and Zbot!gen1 Human classification improves response time because it s faster to test, analyze, and release rules family-by-family than instance-byinstance. It also reduces false positives compared with machine-only classification, since each rule is backed not only by a greater volume of evidence, but by the know-how and experience of seasoned security professionals. Behavioral policy lockdown Symantec distributes new or changed classification rules when they re certified and ready, with no delays introduced by fixed update schedules or slow patch cycles. Client computers start using the rules immediately to identify and remove malware. In a small minority of cases, however, identification and removal isn t enough. Non-process threats like attempts by the Windows Print Spooler Server to modify the partition table under control by the Tidserv rootkit can t be distinguished from innocent code in other words, can t be identified as malware. And parasitic threats infecting key Windows system files can t be removed without risking system instability. In these cases, SONAR locks down the suspect code, intercepting and counteracting illegitimate registry changes, file deletion, folder creation, and more, while permitting execution of operations that pose no risk to the system, user, or network. This approach prevents overreactions that might compromise application utility or system stability, while still providing excellent protection against even heavily encrypted, single-instance customized or Zero-day malware. The combination of real-time behavioral monitoring, machine and human classification, and blocking or lockdown of suspicious code delivers a highly effective final line of defense against sophisticated malware that has been engineered to evade traditional signature-based AV technology. It removes or isolates threats at the moment of execution without deleting high-trust files, tying up system resources in complicated emulations, or relying on users to distinguish real from fake malware alerts, or genuine s from socially engineered phishing attacks. SONAR in action the Symantec advantage SONAR is the only security solution in wide deployment that uses real-time behavioral monitoring to block even new and single-instance malware with no user intervention at all. It combines extreme accuracy with minimal impact on system resources including no userperceivable delays during everyday tasks like boot-up and shutdown, launching applications, browsing the web, reading , playing music and videos, ripping DVDs, and editing documents. The SONAR experience base now covers more than 134 million machines, with analysis of more than 1.3 billion application instances. The technology has identified and blocked more than 24 million threats in 2011 alone while maintaining a 0.02% false-positive rate among files submitted for evaluation. And blocking is enabled automatically on tens of millions of installed systems, protecting them with no requirement for user intervention or commitment of IT resources. 5 Most rewarding to Symantec security professionals is confirmation of the technology s effectiveness in dozens of hacker communications intercepted online. SONAR is more than an incremental advance it is a qualitatively different way of classifying and blocking or isolating malicious code. Considered point-by-point against alternative technologies, the advantages of SONAR are compelling: 5-Symantec Security Technology and Response. STAR Malware Protection Technologies (Web page). (Mountain View, CA: Symantec Corporation. May 1, 2012). 4

8 Emulation-based behavioral engines monitor processes in an emulator at launch or scan time, not in real time. This delays launch of legitimate processes and extends scan times. Local emulation also has significant impact on system resources, forcing tradeoffs between effectiveness and performance. Machine-only evaluation and classification risks false alarms that human security experts would screen out. And hackers are adapting by enhancing their malware with anti-emulation features that they test against security software before release. Host-based Intrusion Prevention/Shields/System Change Monitors keep track of running processes, but alert users to every suspicious action, including perfectly benign changes to RUN keys, driver updates, modifications to the hosts file, and so on. They leave it up to users to evaluate risks and decide on appropriate actions in response to every alert. While sophisticated users appreciate the high degree of control this provides, it is intrusive and annoying to most users, who may ignore alerts or push to have the solution turned off entirely. Simple heuristics with Cloud lookup use a two-stage process to balance protection and performance. First, to avoid a time-consuming lookup, they screen files on the client for simple characteristics like packing. When malware is deliberately engineered to evade screening criteria, for example by releasing it unpacked, the threat may be passed through undetected. And when screening detects a risk and refers files to a cloud service for in-depth evaluation, the round trip has significant impact on process launch times. Incidental characteristics like signatures, packing, and even reputation are correlates that help streamline identification and removal of malware but process behaviors define it. Because SONAR monitors, blocks, and sequesters process behaviors in real time, it provides a final line of defense against threats to IT infrastructure and information assets. Because SONAR classification rules are immune to even 100% FUD obfuscation, the solution escapes the delays, Zero-day vulnerabilities, and protection/performance tradeoffs of signaturebased, on-client heuristic, and hybrid solutions. Hackers know it Symantec Security Response monitoring of underground information networks confirms the real-world effectiveness of SONAR technology. And SONAR capabilities have been proven superior in published comparisons of behavioral-detection solutions. Building on the market-leading strength of the Symantec family of security solutions, SONAR also has compelling advantages of scale, including: More than 50 million active participants worldwide contributing application instances to the SONAR information repository More than 50 million executables, dll s, and applications analyzed every month Conviction and blocking of more than 73,000 malicious files every day (averaged over 90 days ending in December, 2011) 6 Deep integration with other Symantec protection technologies in worldwide use, including Network Intrusion Prevention, Antivirus, and the Symantec Insight reputation engine. The growth path of SONAR has documented dramatic improvements in protection to date against the most serious threats aimed at individual and enterprise systems today. Because SONAR technology is adaptive, constantly evaluating and then monitoring and blocking new malware variants, protection stays effective without time-consuming or performance-sapping user and IT intervention. And Symantec investments position SONAR technology to continuously improve the protection and performance it delivers over many years to come. Take the next step Organizations currently using Symantec Endpoint Protection 11 or alternative technologies should strongly consider upgrading to SONAR advanced behavioral protection, included with Symantec Endpoint Protection Organizations using Symantec Endpoint Protection Star Malware Protection Technologies. 5

9 that are not utilizing the SONAR technology should evaluate the use of SONAR for improved protection with less commitment of user and IT resources. For an in-depth review of what SONAR can do for your organization, visit the SONAR technology page or contact a Symantec Sales representative in your country. 6

10

11 About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Symantec helps organizations secure and manage their information-driven world with security management, endpoint security, messaging security, and application security solutions. Copyright 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 5/

W H I T E P A P E R : T E C H N I C AL

W H I T E P A P E R : T E C H N I C AL W H I T E P A P E R : T E C H N I C AL Using Symantec Endpoint Protection 12.1 to Protect Against Advanced Persistent Threats (APTs) Configuration guidelines for endpoint protection against APTs White

More information

UP L13: Leveraging the full protection of SEP 12.1.x

UP L13: Leveraging the full protection of SEP 12.1.x UP L13: Leveraging the full protection of SEP 12.1.x Martial RICHARD Principal Field Enablement Manager Endpoint Security UP L13 1 Threat landscape (ISTR Vol.18 April 2013) http://www.symantec.com/threatreport/

More information

Securing the endpoint and your data

Securing the endpoint and your data #SymVisionEmea #SymVisionEmea Securing the endpoint and your data Piero DePaoli Sr. Director, Product Marketing Marcus Brownell Sr. Regional Product Manager Securing the Endpoint and Your Data 2 Safe harbor

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

2012 Endpoint Security Best Practices Survey

2012 Endpoint Security Best Practices Survey WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Active Threat Control

Active Threat Control Active Threat Control Proactive Protection Against New and Emerging Threats Why You Should Read this White Paper The unprecedented rise of new threats has deemed traditional security mechanisms both ineffective

More information

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

Symantec Advanced Threat Protection: Network

Symantec Advanced Threat Protection: Network Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data

More information

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems Symantec Endpoint Protection.cloud Employing cloud-based technologies to address security risks to endpoint systems White Paper: Endpoint Protection.cloud - Symantec Endpoint Protection.cloud Contents

More information

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management A Websense Brief By Patrick Murray, Senior Director of Product Management Advanced Persistent Threats: From FUD to Facts With Websense, you can stay a step ahead of the threats. From our roots in web filtering,

More information

Insight. Security Response. Deployment Best Practices

Insight. Security Response. Deployment Best Practices Insight Deployment Best Practices Overview Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec s hundreds of millions of users

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

Types of cyber-attacks. And how to prevent them

Types of cyber-attacks. And how to prevent them Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual

More information

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

Symantec Email Security.cloud - Skeptic Whitepaper

Symantec Email Security.cloud - Skeptic Whitepaper TECHNICAL BRIEF: SYMANTEC EMAIL SECURITY.CLOUD........................................ Symantec Email Security.cloud - Skeptic Whitepaper Who should read this paper This white paper outlines the technical

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

User Documentation Web Traffic Security. University of Stavanger

User Documentation Web Traffic Security. University of Stavanger User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...

More information

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+ ABOUT LAVASOFT Company Overview Lavasoft is the original anti-malware company, creating award-winning, free security and privacy software since 1999. Born of the belief that online security should be available

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Why a Network-based Security Solution is Better than Using Point Solutions Architectures Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone

More information

ENABLING FAST RESPONSES THREAT MONITORING

ENABLING FAST RESPONSES THREAT MONITORING ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,

More information

Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.

Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics. Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information

Netsweeper Whitepaper

Netsweeper Whitepaper Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

Advanced Persistent Threats

Advanced Persistent Threats White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which

More information

Symantec Mobile Security

Symantec Mobile Security Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android

More information

10 Things Every Web Application Firewall Should Provide Share this ebook

10 Things Every Web Application Firewall Should Provide Share this ebook The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security

More information

Zscaler Cloud Web Gateway Test

Zscaler Cloud Web Gateway Test Zscaler Cloud Web Gateway Test A test commissioned by Zscaler, Inc. and performed by AV-TEST GmbH. Date of the report: April15 th, 2016 Executive Summary In March 2016, AV-TEST performed a review of the

More information

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed

More information

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Security re-defines enterprise endpoint protection against advanced malware IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

Building a Web Security Ecosystem to Combat Emerging Internet Threats

Building a Web Security Ecosystem to Combat Emerging Internet Threats I D C V E N D O R S P O T L I G H T Building a Web Security Ecosystem to Combat Emerging Internet Threats September 2005 Adapted from: Worldwide Secure Content Management 2005 2009 Forecast Update and

More information

The Symantec Approach to Defeating Advanced Threats

The Symantec Approach to Defeating Advanced Threats WHITE PAPER: THE SYMANTEC APPROACH TO DEFEATING ADVANCED........... THREATS............................. The Symantec Approach to Defeating Advanced Threats Who should read this paper For security practioners

More information

Protecting the Infrastructure: Symantec Web Gateway

Protecting the Infrastructure: Symantec Web Gateway Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

Finding Email Security in the Cloud

Finding Email Security in the Cloud WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email

More information

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Network Intrusion Prevention System for Symantec Endpoint Protection 11.X User Guide

Network Intrusion Prevention System for Symantec Endpoint Protection 11.X User Guide Network Intrusion Prevention System for Symantec Endpoint Protection 11.X Technical Brief: SEP Network Intrusion Prevention System Network Intrusion Prevention System for Symantec Endpoint Protection

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Almost 400 million people 1 fall victim to cybercrime every year.

Almost 400 million people 1 fall victim to cybercrime every year. 400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked

More information

Endpoint Security Management

Endpoint Security Management Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

5 Steps to Advanced Threat Protection

5 Steps to Advanced Threat Protection 5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious

More information

IBM Security X-Force Threat Intelligence

IBM Security X-Force Threat Intelligence IBM Security X-Force Threat Intelligence Use dynamic IBM X-Force data with IBM Security QRadar to detect the latest Internet threats Highlights Automatically feed IBM X-Force data into IBM QRadar Security

More information

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious

More information

Defending Against Cyber Attacks with SessionLevel Network Security

Defending Against Cyber Attacks with SessionLevel Network Security Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive

More information

Symantec Cyber Security Services: DeepSight Intelligence

Symantec Cyber Security Services: DeepSight Intelligence Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with

More information

Endpoint Security: Moving Beyond AV

Endpoint Security: Moving Beyond AV Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9

More information

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference

More information

Protect Your Business and Customers from Online Fraud

Protect Your Business and Customers from Online Fraud DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently

More information

Symantec Advanced Threat Protection: Network

Symantec Advanced Threat Protection: Network Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,

More information

Recurrent Patterns Detection Technology. White Paper

Recurrent Patterns Detection Technology. White Paper SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware

More information

WildFire. Preparing for Modern Network Attacks

WildFire. Preparing for Modern Network Attacks WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends

More information

24/7 Visibility into Advanced Malware on Networks and Endpoints

24/7 Visibility into Advanced Malware on Networks and Endpoints WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from

More information

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value. SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,

More information

Secure Web Gateways Buyer s Guide >

Secure Web Gateways Buyer s Guide > White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious

More information

Endpoint Protection Small Business Edition 2013?

Endpoint Protection Small Business Edition 2013? Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.

More information

How Spyware and Anti-Spyware Work

How Spyware and Anti-Spyware Work 22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade

More information

How To Monitor Your Entire It Environment

How To Monitor Your Entire It Environment Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

Integrating MSS, SEP and NGFW to catch targeted APTs

Integrating MSS, SEP and NGFW to catch targeted APTs #SymVisionEmea #SymVisionEmea Integrating MSS, SEP and NGFW to catch targeted APTs Tom Davison Information Security Practice Manager, UK&I Antonio Forzieri EMEA Solution Lead, Cyber Security 2 Information

More information