Kippreport gets the scoop from Neelesh Bhatnagar, CEO of Emax, and Nadeem Khanzadah, head of omnichannel retail at Jumbo GroupSeptember 2, 2015 5:24
Sourcefire Delivers Unprecedented Visibility And Tracking Of Malware
New Network File Trajectory and Device Trajectory Innovations Pinpoint Malware Movement Throughout User Environments
May 21, 2013 2:48 by anila
Dubai, UAE – May 21, 2013 — Sourcefire, Inc. (Nasdaq: FIRE), a leader in intelligent cybersecurity solutions, today introduced innovative malware trajectory capabilities across its Advanced Malware Protection portfolio, giving customers detailed visibility into malware attack activity and enabling them to detect, remediate and control malware outbreaks. With these additions, Sourcefire Advanced Malware Protection solutions are the only offerings that add a continuous capability to its malware blocking, going beyond point-in-time detection to confirm an infection, trace its path, analyze its behavior, remediate its targets and report on its impact regardless of when a file is determined to be malware.
“Even organizations which are diligent in their security measures realize that breaches are entirely too likely in the face of modern threats and they need solutions that help them deal with malware before, during and after an attack,” said Martin Roesch, Sourcefire founder and CTO. “The enhanced trajectory features in our Advanced Malware Protection portfolio provide customers with decisive insight when a breach occurs and extend Sourcefire’s innovative Retrospective Security with the ability to immediately locate and eradicate malicious files everywhere they surface.”
With Sourcefire’s new Network File Trajectory and Device Trajectory capabilities, customers can quickly determine the scope of an outbreak and track malware or suspicious files across the network and at the system level. These new features enable security personnel to quickly locate malware point-of-entry, propagation and behavior. This is an innovative component of Sourcefire’s revolutionary Retrospective Security, which allows organizations to quickly identify, scope, track, investigate and remediate malware, even when malicious files are originally deemed “safe” or “unknown.”
Network File Trajectory delivers the ability to track malware across the network, providing detailed information on point of entry, propagation, protocols used, and which users or endpoints are involved. This is available as part of Sourcefire’s Advanced Malware Protection for FirePOWER™ software license, a subscription that can be added to a Next-Generation Intrusion Prevention Systems (NGIPS) or Next-Generation Firewall (NGFW), or as a dedicated appliance, both of which provide advanced malware protection for networks.
Device Trajectory builds upon existing endpoint File Trajectory capabilities to deliver critical analysis of system level activities, file origination and file relationships for root cause and forensic analysis to track and pinpoint behaviors indicating a compromise has happened and a breach has most likely occurred. Device Trajectory is available as part of the FireAMP™ host-based protection available for endpoints and virtual networks.
Sourcefire is further enhancing FireAMP with new Indicators of Compromise and Device Flow Correlation capabilities, which enable users to correlate seemingly benign and unrelated events, while also monitoring device activity and communications to uncover potential malware.
Indicators of Compromise (IoC) – Correlates malware intelligence and even seemingly benign events to determine whether a system may have been compromised – providing users with a prioritized list of potentially compromised devices.
Device Flow Correlation – Correlation of activities on an endpoint with traffic on the network, providing integrated intelligence and automation across the advanced malware protection security infrastructure. This provides distinct advantages in controlling malware proliferation on endpoints outside the protections of a corporate network, like remote or mobile workers.
In addition, the trajectory and IoC features leverage the captured network activity to accelerate investigation and compromise prioritization.
Visit the Advanced Malware Protection section on Sourcefire.com for more information.
Sourcefire, Inc. (Nasdaq:FIRE), a world leader in intelligent cybersecurity solutions, is transforming the way global large- to mid-size organizations and government agencies manage and minimize security risks to their dynamic networks, endpoints, mobile devices and virtual environments. With solutions from a next-generation network security platform to advanced malware protection, Sourcefire’s threat-centric approach provides customers with Agile Security® that delivers protection before, during and after an attack. Trusted for more than 10 years, Sourcefire has earned a reputation for innovation, consistent security effectiveness and world-class research all focused on detecting, understanding and stopping threats. For more information about Sourcefire, please visit www.sourcefire.com.
Sourcefire, the Sourcefire logo, Snort, the Snort and Pig logo, Agile Security and the Agile Security logo, ClamAV, FireAMP, FirePOWER, FireSIGHT and certain other trademarks and logos are trademarks or registered trademarks of Sourcefire, Inc. in the United States and other countries. Other company, product and service names may be trademarks or service marks of others.
# # #
For further information, please contact:
OAK Consulting FZ LLC