Modern malware detection and prevention behind the firewall
FireEye now offers an inline appliance version of its Malware Protection System: the new appliances sit behind the firewall and detect attacks without the use of antivirus signatures.
The new appliances, which are based on the company's existing Malware Protection System products, basically catch the unknown threats that firewalls and intrusion prevention systems (IPSes) don't, says Marc Maiffrett, chief security architect for FireEye. "When we light up is when [unknown threats] are slipping through, or if there's already stuff on your network," he says.
FireEye's technology uses virtual machine analysis and FireEye's cloud-based intelligence network -- but no malware signatures. "In a full malware lifecycle, there are still inbound exploits coming through the network from WiFi or USBs … existing compromised machines, so we look at the outbound traffic coming out of the network [as well]," Maiffrett says.
Maiffrett says FireEye got to see its technology's response during Operation Aurora, when some of its customers were among those targeted in the attacks on Google, Adobe, Intel, and others. "We got to see firsthand how it would play out. Three of our customers ... were using our [original] detection product," he says, which helped analyze the malware used in the attacks.
With the new inline appliance, a zero-day like Aurora would go to the VM analysis engine first: "As soon as we could see it was bad ... we put in a rule that blocks it from calling back to the server in Taiwan," for example, Maiffrett says. "So any computers that might have been targeted would not be able to communicate out."
FireEye today also launched Modern Malware Exposed, a site that includes educational content and tools for businesses and provides a free malware assessment.
Pricing for the FireEye 2000, 4000, and 7000 series network security appliances starts at $24,950.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024