We have seen disruptions affect every industry during the last millennia. From chemical photography to digital photography, from horse drawn carriages to supersonic flight, from shovels to hydraulic excavators, from the telegraph to the telephone and of course from manual computation to modern computers and smart phones which brings rise to the likes of Uber, Facebook, Twitter, etc. for even more disruptions. So, why is it that we tend to scoff when a cyber security disruption is brought to our attention?
Effective Cyber Protection
Is good really good enough when your productivity, profitability and corporate reputation is at stake? What defines effective? At one point if we could detect a signature and prevent future occurrences it was considered effective. Then the introduction of behavior-based technologies like sandboxesallowed for the detonation of malware in secure, quarantined areas so that production environments would not be affected. Even new approaches like Content Disarm and Remediation provide variations on existing well known (and spoof-able) approaches. So, by definition, the only truly effective cyber protection solution is one that can prevent zero-day malware without the need for long delays or costly resources.
Evolving To Disruption
Content, whether through datafiles or data streams, is one of the most common and pervasive methods by which malware infiltrates an enterprise. Current security approaches cannot ensure that incoming network-based content is free of malware because they fail to identify, let alone prevent, zero-day malware and unknown threats hidden in content. Moreover, such approaches are resource intensive, slow and evadable - all of which affect an enterprise’s bottom line and profitability. What is needed today is evasion-proof, instantaneous, end-to-end security for any kind of network based non-executable content for a variety of persistently used attack vectors such as email, web, and cloud file sharing applications. Put more simply, we have been evolving various security techniques but are now at a crossroad where only disruption will deliver the impact necessary to truly prevent versus having to remediate cyber threats.
Modern Cyber Protection
To be truly modern, your cyber prevention solution should deliver instantaneous end-to-end security for any kind of network based non-executable content for a variety of persistently used attack vectors such as email, web, and cloud file sharing applications, challenging the norms that rely on slow, costly and mostly outdated, ineffective methods of sandboxing, signatures and behavioral inspection. The SoleGATE™ premise is simple: executable code in any type of non-executable content such as datafiles and datastreams is malware, and therefore should not be permitted to enter any organization. And, finally, SoleGATE (now part of Mimecast) is conclusive: content is either infected (quarantined) or it is not (clean). There is no behavioral analysis or guesswork, so you can prevent cyber threats instead of remediating the damage.
SoleGATE applies to protection against malware in active content and file-less malware as well. Active content such as macros is de-obfuscated no matter the level of nesting or encryption and evaluated using the patented DvC™ parser-based engine to determine its true purpose. Malicious scripts, links and URLs that may be hidden, self-extracting or even on remote servers are instantaneously analyzed and determined to be clean or not.
Get Solebit’s whitepaper on a transformative, evasion-proof approach against modern cyber-attacks that doesn’t require sandboxing. It will outline how to strengthen your cyber defenses dramatically by preventing attacks before they enter and harm your organization, your customers and your brand. Remediation is costly, prevention is not.