Attack Vectors
Malware Detection with Perception Point
Malware (short for “malicious software”) detection includes various types of threats: viruses, ransomware, spyware, worms, trojans, keyloggers, and many more. The most common ways for malware to be transported are in files and URLs.
In a world where collaboration of content, across multiple apps, is becoming the main driver for business performance, malware becomes an irreplaceable tool in any attacker’s arsenal.
Although this sounds impossible – we’ve identified a common factor in all malware-based attacks. Learn how Perception Point delivers advanced malware detection and prevents any malware from penetrating your organization.
Malware Detection & Prevention Challenges
Malware detection and protection are becoming an increasingly complex problem to solve.
The complexity is hundreds of millions of new malware variants created every year, the increased use of advanced malware, the combination of several techniques, employing evasion techniques, and the proliferation of content sharing platforms.
Legacy solutions all fall in at least one of these challenges, leaving end-users exposed to malware attacks on a daily basis.
The Malware Kill Chain
Step 1
Development
Step 2
Reconnaissance and Weaponization
Attacker finds a software vehicle to transport the malware – e.g. adding it as an attachment to an email, sending a URL via a messaging app, or uploading it to a cloud storage platform for users to download.
Step 3
Delivery and
Installation
Step 4
Persistence
and Action
Usually the malware will include persistence techniques to make sure that it will still continue even after system reboot or loss of internet connection.
Our Anti-Malware Detection Engines
Perception Point tackles malware detection by dividing it into two types:
Everyday Malware
Perception Point developed next-gen static and dynamic engines that detect and prevent any attempt to deliver malware.
These dynamic and static engines are be broken up into several elements: In the front line stands the Recursive Unpacker which extracts all files and URLs transferred, thus uncovering and thwarting evasion techniques.
Next is the Threat Intelligence layer – The best-in-class intelligence sources coupled with internally developed engines scans all content to identify any “known” malware.
Following the threat intelligence, is a stack of the leading Anti-virus engines in the world in addition to Perception Point’s Signature Analysis engines for highly complex malware.
The last piece of the “Everyday Malware” stack, is Perception Point’s phishing engines which use in-house build image recognition capabilities to prevent any type of URL based malware delivery.
Advanced Malware
New, sophisticated malware attacks all rely on the usage of an exploitation technique.
This means that prior to any advanced malware release, the attacker will try to use an exploit to set the ground ready for installing one of any millions of malware options he has in his hands.
Perception Point knows how attackers think. This is why we invented the HAP – a proprietary next-gen dynamic engine that has visibility into the exploit level.
In other words, instead of chasing the many malware out there, we “cut off the root” and prevent the malware from even being delivered, not to mention from running.
Our Advantages
Multi-layered Approach
Combining numerous state of the art engines that use static techniques to prevent any type of malware delivery, whether from file or URL.
Anti-evasion Techniques
Next-gen engines internally developed by Perception Point, uncover any attempt to conceal the malware with evasion techniques.
Eliminating Advanced Malware
Next-gen dynamic engine eliminates the risk of new malware variants in any advanced attack by intercepting the malicious intent prior to the malware delivery – in the exploit stage.
Maximum
Usability
Providing ultimate detection without compromising on content functionality, allowing your employees to receive content from external sources without being limited with many types of policies for file delivery.
Cross Channel Coverage
Holistic solution that can be deployed across any channel to ensure the same level of malware protection in any access point to your organization.
Deployment-
ready
Deployed in one-click, creating zero fuss to you and your IT team.