Threat protection specialist Iboss Network Security announced an upgrade to its advanced persistent threats (APT) defense solution, FireSphere, which uses the company’s network traffic anomaly monitoring technology to provide protection against malware exploits.
FireSphere network traffic anomaly monitoring provides a layer of protection that increases infection detection and identifies threats that use advanced evasive protocols to mask malicious network attacks.
Using historical data logs to establish a stable baseline for network traffic, FireSphere monitors outbound network data transfers against normal baselines to detect anomalies signifying suspicious traffic.
“Organizations should strive to deploy the best preventive security possible, but they also need to devote the same level of commitment to the realities of post-infection security, and employ technologies that provide detection and containment in order to reduce data exfiltration,” Paul Martini, CEO and co-founder of Iboss, told eWeek. “Some businesses are still in denial about the potential for a breach, either because of their size or because there is so much national attention on large corporations like Sony and Anthem that gives smaller companies a false sense of security.”
However, every company, regardless of size or resources, must invest in detective security capabilities that provide continuous data monitoring and advanced APT defense, which is critical for organizations to mitigate threats and minimize the risk of data loss in today’s threat environment, Martini explained.
The company’s technology continuously monitors and compares current network traffic to pinpoint unusual behavior that can signify a network has been compromised.
Once a problem is revealed, the data transfer is immediately stopped and IT is alerted to the problem. In addition, FireSphere Advanced Sandboxing employs proprietary technology designed to detect the malware created to evade detection by standard sandboxing solutions.
It isolates and executes suspicious files in a safe environment to deliver in-depth analysis of complex malware and polymorphic viruses. FireSphere’s automated cloud sandboxing scans across all files and URLs and includes an on-demand feature to provide users with behavioral intelligence on suspicious files and malware.
In addition, the FireSphere CISO Command Center correlates forensic threat intelligence from cloudsourcing across more than 55 advanced malware engines and millions of endpoints to deliver the complete context of threats.
“Businesses are also struggling to find experienced IT security professionals with the skillsets needed in today’s threat landscape. It’s a challenge because technology and hackers have grown so advanced and there are risks around everything from mobile devices, social media, wearables and corporate networks,” Martini said. “There are also budget constraints and limited resources competing for business’ attention, which often puts hiring or training for the new threat environment on the backburner. But businesses cannot afford to ignore security. Oftentimes, breaches can occur due to human error and is entirely preventable.”