Petach Tikva, Israel– Minerva, a provider of endpoint security solutions, has added significant new capabilities to its Anti-Evasion Platform, which strengthens endpoint security to prevent unknown threats that get past existing defenses. The latest release is designed to fight previously-unseen malware across multiple categories of evasion techniques, spanning not only situation-aware malware, but also threats that bypass detection by employing a variety of memory injection methods and hiding within document files.
"Instead of relying on previously-known patterns, behaviors or signatures, our Anti-Evasion Platform deceives the threat regarding its ability to interact with various aspects of its environment. Our solution blocks the adversary from gaining a foothold on the endpoint, rendering evasive techniques ineffective," said Eddy Bobritsky, Co-Founder and CEO of Minerva. "Unlike other solutions, our deceptive approach to blocking unknown malware doesn’t rely on which attack vector it came through. Instead, it simulates an environment where malware would never be able to execute, significantly reducing the organization’s endpoint security efforts."
The Minerva Anti-Evasion Platform can be installed on both physical and virtual environments. With the lightweight nature of the Minerva agent, the Anti-Evasion Platform enhances Virtual Desktop Infrastructure (VDI) security for end-to-end, fully-enabled anti-malware protection, without adding any performance overhead. The platform is both VMware Ready and Citrix Ready certified.
The latest release includes:
- Ransomware Protection – Blocks ransomware to provide full protection against data loss, ensuring that victims don’t have to pay ransom to recover any files.
- Memory Injection Prevention – Organizations can now block attacks that use memory injection techniques to hide malicious code in legitimate processes to evade detection by anti-malware products. By deceiving malware, the Memory Injection Prevention module blocks fileless attacks, process hollowing attacks and other injection methods, rendering these evasive techniques ineffective.
- Malicious Document Prevention – Blocks malicious actions initiated by document files, such as those that employ macros, PowerShell and other scripts. The new Malicious Document Prevention module allows enterprises to utilize full capabilities of productivity suites such as Microsoft Office, without the concern of human error.
A Chief Information Security Officer (CISO) at a leading worldwide shipping carrier said "Minerva’s latest release significantly improves our endpoint defense strategy. We were able to deploy the solution within less than a week and saw immediate results. The number of ransomware attacks on us reduced dramatically and relieved the SOC team from having to investigate numerous alerts that resulted in days wasted on incident handling."
"Malware is consistently evolving to evade existing defenses. The latest capabilities of our Anti-Evasion Platform delivers a solution that is comprehensive in preventing stealthy and elusive attacks, all without being intrusive on the endpoint," continued Bobritsky. "Every attack stopped by Minerva can be turned into threat intelligence that enriches the organization’s defense ecosystem where the attack may not be known to them as no signature, pattern or behavioral anomaly exists yet."
Minerva allows IT security teams to strengthen endpoint defenses without taking on the operational challenges often associated with deploying and maintaining security solutions. Customers can rapidly roll out Minerva’s Anti-Evasion Platform and benefit from an ultra-light agent that doesn’t require reboot or affect endpoint performance. With this approach, Minerva removes the burden from already scarce security resources that are overwhelmed with alerts and false positives. Minerva blocks the attack upfront without the need for any human intervention and without limiting day-to-day business activities.
Minerva will be hosting a webinar on Wednesday, July 19, at 1 p.m. (ET) titled “How to Beat Evasive Malware at Its Own Game” where its experts will discuss common evasive techniques used by malware authors and how organizations can enhance their endpoint security architecture to prevent these types of attacks.