Security firm 'detonates' copies of suspicious files to sniff out malware, botnet attacks
Network World - HBGary on Monday introduced an appliance that sits at the perimeter of the enterprise network to watch for possible incoming malware and outgoing traces of botnet infections.
Called Razor, the appliance uses a "virtual-machine system" that takes all files and copies them to inspect for malware by "detonating" the file copies in a sandbox to examine whether any document contains malicious content, according to HBGary CEO Greg Hoglund. It also watches for malicious command-and-control activity, and can automatically block further traffic associated with a malicious site.
PRODUCT NEWS: Appliance automates malware detection
Hoglund says the Razor appliance uses the same Digital DNA and Active Defense technology found in HBGary's end-node products. In deploying Razor at the perimeter, the idea is that if malware is detected in transit, an alert would be sent to the enterprise security information management point, with the goal of examining the machine where it's headed. The method does not rely on "static signature-based security," says Hoglund, adding customers feel this is no longer enough.
Interest in non-signature-based protection methods is on the rise. Razor is intended to compete with the detection approaches used by FireEye and Damballa, which do not rely on malware signatures. The announcement of HBGary's Razor comes on the heels of yet another new product to compete in this arena, the Spectrum appliance announced by NetWitness earlier this month.
Razor, which starts at $23,500, is now in beta and expected to ship in the February time frame.
Read more about wide area network in Network World's Wide Area Network section.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!