^

Technology

Sourcefire offers innovative malware trajectory solutions

The Philippine Star

MANILA, Philippines - Sourcefire Inc., a leader in intelligent cyber security solutions, has introduced innovative malware trajectory capabilities across its advanced malware protection (AMP) portfolio, giving customers detailed visibility into malware attack activity and enabling them to detect, remediate and control malware outbreaks.

With these additions, Sourcefire AMP solutions are the only offerings that add a continuous capability to its malware blocking, going beyond point-in-time detection to confirm an infection, trace its path, analyze its behavior, remediate its targets and report on its impact regardless of when a file is determined to be malware.

“Even organizations which are diligent in their security measures realize that breaches are entirely too likely in the face of modern threats and they need solutions that help them deal with malware before, during and after an attack,” said Martin Roesch, Sourcefire founder and CTO.

Roesch said the enhanced trajectory features in their AMP portfolio provide customers with decisive insight when a breach occurs and extend Sourcefire’s innovative retrospective security with the ability to immediately locate and eradicate malicious files everywhere they surface.

With Sourcefire’s new network file trajectory and device trajectory capabilities, customers can quickly determine the scope of an outbreak and track malware or suspicious files across the network and at the system level.

These new features enable security personnel to quickly locate malware point of entry, propagation and behavior. This is an innovative component of Sourcefire’s revolutionary Retrospective Security, which allows organizations to quickly identify scope, track, investigate and remediate malware, even when malicious files are originally deemed “safe” or “unknown.”

The network file trajectory delivers the ability to track malware across the network, providing detailed information on point of entry, propagation, protocols used, and which users or endpoints are involved, according to Roesch.

“This is available as part of Sourcefire’s Advanced Malware Protection for FirePOWER software license, a subscription that can be added to a Next-Generation Intrusion Prevention Systems (NGIPS) or Next-Generation Firewall (NGFW), or as a dedicated appliance, both of which provide advanced malware protection for networks,” he said.

On the other hand, the device trajectory builds upon existing endpoint file trajectory capabilities to deliver critical analysis of system-level activities, file origination and file relationships for root cause and forensic analysis to track and pinpoint behaviors indicating a compromise has happened and a breach has most likely occurred. Device trajectory is available as part of the FireAMP host-based protection available for endpoints and virtual networks.

Roesch said Sourcefire is further enhancing FireAMP with new indicators of compromise and device flow correlation capabilities, which enable users to correlate seemingly benign and unrelated events, while also monitoring device activity and communications to uncover potential malware.

The indicators of compromise (IoC) correlates malware intelligence and even seemingly benign events to determine whether a system may have been compromised, providing users with a prioritized list of potentially compromised devices.

Meanwhile, the device flow correlation (DFO) is a correlation of activities on an endpoint with traffic on the network, providing integrated intelligence and automation across the advanced malware protection security infrastructure. This provides distinct advantages in controlling malware proliferation on endpoints outside the protections of a corporate network, like remote or mobile workers. 

In addition, the trajectory and IoC features leverage the captured network activity to accelerate investigation and compromise prioritization.

Visit the Advanced Malware Protection section on Sourcefire.com for more information.

 

ADVANCED MALWARE PROTECTION

MALWARE

MARTIN ROESCH

NETWORK

NEXT-GENERATION FIREWALL

NEXT-GENERATION INTRUSION PREVENTION SYSTEMS

RETROSPECTIVE SECURITY

ROESCH

SOURCEFIRE

TRAJECTORY

  • Latest
Latest
Latest
abtest
Are you sure you want to log out?
X
Login

Philstar.com is one of the most vibrant, opinionated, discerning communities of readers on cyberspace. With your meaningful insights, help shape the stories that can shape the country. Sign up now!

Get Updated:

Signup for the News Round now

FORGOT PASSWORD?
SIGN IN
or sign in with