Published: 28 February 2014
Summary
Traditional malware protection proves increasingly unsuccessful to protect against some of the latest threats. Network-based malware protection systems are important components of advanced threat detection. This assessment focuses on the strengths and weaknesses of MPSs.
Included in Full Research
- Common MPS Functionality
- Use Cases
- Deployment
- Sensor Deployment
- Sandbox Deployment: Physical Appliance, Virtual Appliance or Cloud?
- Performance and Throughput
- Detection
- Bad Reputation Will Make Malware Fail at Multiple Levels
- Automated Triage
- Static Detection Techniques
- Dynamic Detection Techniques
- Network Events: Callback Detection
- Prevention
- Response
- The Importance of End-to-End Analysis and Remediation
- Manageability and Usability
- Market Landscape
- Future Developments
- Alternatives and Adjacent Technologies
- Strengths
- Weaknesses
- Do Not Deploy MPS Before Optimizing Existing Malware Controls
- Be Careful Not to Swamp an MPS With "Trivial Malware"
- Perform an Extensive Proof of Concept
- Plan for Analysis and Remediation Capacity, Expertise and Tools
- Choose an MPS That Best Fits Your Use Cases, Architecture and Expertise
- Virtual Execution Environments: Sandboxing, Emulation and Virtualization
- Emulation
- Virtualization
- Freely Available Virtual Execution Environments
- Vendors
- AhnLab
- Check Point Software Technologies
- Damballa
- FireEye
- Fortinet
- General Dynamics Fidelis Cybersecurity Solutions
- Joe Security
- Lastline
- McAfee
- Norman Shark (Blue Coat)
- Palo Alto Networks
- RSA
- Sourcefire (Cisco)
- ThreatGRID
- ThreatTrack Security
- Trend Micro