Technical Brochure F-SECURE THREAT SHIELD

Similar documents
STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

TOMORROW S SECURITY, DELIVERED TODAY. Protection Service for Business

HOLISTIC CYBER SECURITY FOR BUSINESSES

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

MESSAGING SECURITY GATEWAY. Solution overview

Kaspersky Security Network

CloudSOC and Security.cloud for Microsoft Office 365

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

PROTECTION SERVICE FOR BUSINESS. Datasheet

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Imperva Incapsula Website Security

Seqrite Endpoint Security

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Symantec Ransomware Protection

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

SentinelOne Technical Brief

SentinelOne Technical Brief

Cisco Security: Advanced Threat Defense for Microsoft Office 365

Synchronized Security

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

with Advanced Protection

MODERN DESKTOP SECURITY

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Symantec Protection Suite Add-On for Hosted Security

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

KASPERSKY SECURITY FOR MICROSOFT OFFICE s are sent every second. It only takes one to bring down your business.

Security Gap Analysis: Aggregrated Results

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

TREND MICRO SMART PROTECTION SUITES

Advanced Threat Protection Buyer s Guide GUIDANCE TO ADVANCE YOUR ORGANIZATION S SECURITY POSTURE

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Securing the Modern Data Center with Trend Micro Deep Security

THE ACCENTURE CYBER DEFENSE SOLUTION

Cisco Advanced Malware Protection for Endpoints

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Advanced Malware Protection: A Buyer s Guide

New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Juniper Sky Advanced Threat Prevention

JUNIPER SKY ADVANCED THREAT PREVENTION

Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure

RSA INCIDENT RESPONSE SERVICES

Measuring cloud-based anti-malware protection for Office 365 user accounts

Managed Endpoint Defense

Office 365 Integration Guide Software Version 6.7

Endpoint Security for the Enterprise. Multilayered Defense for the Cloud Generation FAMILY BROCHURE

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

TREND MICRO SMART PROTECTION SUITES

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Artificial Intelligence Drives the next Generation of Internet Security

Detect Cyber Threats with Securonix Proxy Traffic Analyzer

Cisco Advanced Malware Protection. May 2016

McAfee Endpoint Security

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

RSA INCIDENT RESPONSE SERVICES

Symantec Endpoint Protection 14

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

CAS Quick Deployment Guide January 2018

Sophos Central Admin. help

Office 365 Buyers Guide: Best Practices for Securing Office 365

AT&T Endpoint Security

Maximum Security with Minimum Impact : Going Beyond Next Gen

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

Bitdefender GravityZone. Supreme protection against active threats for the SMB market

Behavioral Analytics A Closer Look

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

MCAFEE INTEGRATED THREAT DEFENSE SOLUTION

Get Max Internet Security where to buy software for students ]

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Cisco s Appliance-based Content Security: IronPort and Web Security

Future-ready security for small and mid-size enterprises

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

SandBlast Agent FAQ Check Point Software Technologies Ltd. All rights reserved P. 1. [Internal Use] for Check Point employees

Reduce Your Network's Attack Surface

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Abstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016

All-in-one coverage for your business

FIREWALL BEST PRACTICES TO BLOCK

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

BETTER Mobile Threat Defense (BMTD)

CYBER RESILIENCE & INCIDENT RESPONSE

UTM 5000 WannaCry Technote

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Symantec Advanced Threat Protection: Endpoint

Cisco Advanced Malware Protection against WannaCry

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

THE EVOLUTION OF SIEM

TITLE FIELD OF THE INVENTION BACKGROUND OF THE INVENTION

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CYBER SECURITY OPERATION CENTER

Building Resilience in a Digital Enterprise

Symantec Endpoint Protection Cloud (SEPC)

Microsoft Security Management

Transcription:

Technical Brochure F-SECURE THREAT SHIELD

F-SECURE THREATSHIELD F-Secure ThreatShield is a gateway-level security solution for protecting email and web traffic, with built-in network sandboxing technology. It is designed specifically to protect against spam, ransomware, phishing, and advanced targeted attacks. Its unique network sandboxing technology automatically detonates suspicious attachments and URLs, triggering a multifaceted threat detection and behavioral analysis process. With this approach, ThreatShield easily finds targeted, more advanced attacks, such as script-based and handmade malware and 0-day exploits. ThreatShield provides unique value for IT teams by combining your gateway protection needs into one unified solution. Less hardware means less maintenance load, and it also creates considerable synergy between system administrators, who can jointly manage the gateway-level protection for email, web traffic, and sandboxing. 2

KEY FEATURES F-Secure ThreatShield is a gateway-level security solution for protecting email and web traffic, with built-in network sandboxing technology. It is designed specifically to protect against spam, ransomware, phishing, and advanced targeted attacks. Supported OS: CentOS, Redhat, Ubuntu, Debian. Check the version numbers online. Multi-engine anti-malware Detects a broader range of malicious features, patterns, and trends. Web content control Enables restriction of unproductive and inappropriate Internet usage. Email scanning Scans ingoing and outgoing attachments and links for malicious content. Real-time threat intelligence F-Secure s Security Cloud identifies, analyzes, and prevents new and emerging threats. Browsing protection Proactively prevents end-users from visiting malicious and phishing sites. Advanced threat protection** Network sandbox that detonates, analyzes, and detects malicious activity. Web traffic scanning Scans for malicious content in ingoing and outgoing web traffic (HTTP & HTTPS). Spam filtering Prevents unwanted spam emails with 99.9% detection rate with zero false positives. **THREATSHIELD PREMIUM 3

KEY BENEFITS ThreatShield provides unique value for IT teams by combining email, web and sandboxing gateway needs into one unified solution. Cost-efficient prevention Preventing commodity attacks and spam, and detecting the more advanced and targeted attacks via sandboxing, early at the gateway level is vastly more cost efficient and safer than on the endpoint itself. Less infrastructure maintenance It lowers the maintenance workload by consolidating email and web gateway infrastructure, in addition to that of a network sandbox, to only one set of hardware. Team Synergies ThreatShield creates considerable knowledge and work synergies between system administrators, who can jointly manage the gateway level protection for email, web and sandboxing from one portal.management tools. 4

HOW DOES IT WORK? High-risk or suspicious content is delivered to the network sandbox component for detonation and advanced threat detection. Based on the risk profile of the content, it is delivered to F-Secure Security Cloud for in-depth analysis, including sandbox detonation. Content is subjected to a local threat analysis and detection process to filter out malware, spam, and unwanted web content. Incoming email and web traffic is directed to ThreatShield for analysis before going any further in the environment. Email and web traffic, including contents like attachments and URLS, are intercepted by HTTP(S), SMTP, and FTP proxies. Administrators have rich reporting and advanced security analytics on blocked content at their disposal, making investigation and incident response fast and effective. Protected endpoints and servers can safely browse, download, transfer, and read or open emails. 5

ADVANCED THREAT DETECTION Its unique network sandboxing technology automatically detonates suspicious attachments and URLs, triggering a multi-faceted threat detection and behavioral analysis process. With this approach, ThreatShield can easily find targeted, more advanced attacks, such as script-based and handmade malware and 0-day exploits. 1 2 3 Threat Intelligence Check The object is first analyzed based on various lightweight identifiers, such as reputation and prevalence, and is automatically blocked if any known threats are detected. This check is made for fast initial decisions, and can already filter nearly 99% of all common malicious content. Static Metadata Analysis After detonation, the object s metadata and structure is automatically extracted and put through a multi-stage static analysis process, which looks for patterns and features associated with malicious behavior. Dynamic Behavior Analysis Finally, a dynamic runtime analysis is performed to find strange, suspicious, and outrights malicious behavior, such as editing the system registry, launching network connections, making API calls, influencing system processes and drivers, and causing unusual file system activity. 6

CONTACT US TODAY FOR A FREE TRIAL www.f-secure.com/threatshield 7

ABOUT F-SECURE Nobody knows cyber security like F-Secure. For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people. With unsurpassed experience in endpoint protection as well as detection and response, F-Secure shields enterprises and consumers against everything from advanced cyber attacks and data breaches to widespread ransomware infections. F-Secure s sophisticated technology combines the power of machine learning with the human expertise of its world-renowned security labs for a singular approach called Live Security. F-Secure s security experts have participated in more European cyber crime scene investigations than any other company in the market, and its products are sold all over the world by over 200 broadband and mobile operators and thousands of resellers. Founded in 1988, F-Secure is listed on the NASDAQ OMX Helsinki Ltd. www.f-secure.com www.twitter.com/fsecure www.facebook.com/f-secure