Security Ecosystems Evolve

Any chef knows that a great meal is really just the combination of select fresh ingredients brought together in a specific harmony to elevate those individual ingredients into something wholly new. Every time you enjoy a gumbo instead of a paella you are tasting the same ingredients in a different combination. Wouldn’t it be great if you could just change combinations of security technology to meet the ever-changing dynamics of cyber threat prevention?

What IS A Security Ecosystem

According to Chad Perrin in a TechRepublic article “Security is an ecosystem — not a product. You cannot buy it except at the cost of giving it away.”   He goes on to report:

“People tend to have opinions about what constitutes: the right antivirus software, the right firewall, the right spam filter, the right browser, the right operating system, and so on

There's no such thing as "the right" any of those to achieve "security". There are, at any given time, some choices that are better than others. Some choices are more secure than others. Some impose greater costs on the user than others, as well. Some, believe it or not, may be exceedingly good (for right now) at providing security within their specific area of specialization but introduce other vulnerabilities that you may find unacceptable.”

1+1=5

Cyber prevention strategies have gone through a number of evolutions over the last 40 years, from signature-based to behavior-based to static analysis-based. Unfortunately, it seems like most organizations have taken the finger in the dyke strategy for dealing with cyber threats and malware attacks. This worked when there were only one or two cyber-attacks to worry about, but now that there are thousands to deal with it seems like we have hundreds of different fingers in the dyke instead of looking at a better way to solve for all of the leaks. Looking holistically at the problem will allow specific security ecosystems to emerge that can deliver not just linear but exponential value.

A perfect example of this is the combination of Solebit and Mimecast. According to researchMimecast conducted with Vanson Bourne, more than 80 percent of organizations have seen both targeted and untargeted phishing attacks increase or stay the same over the last year. Additionally, cybercriminals are constantly adapting their attack methods, looking for new ways to bypass security solutions that look for specific behaviors or signature matches. Mimecast’s cyber resiliency platform combined with Solebit’s SoleGATE will now set a new level of value for your security ecosystem.

It Starts With Prevention

Every ecosystem needs an anchor technology and that is where  static analysis comes in. Solebit’s SoleGATE (now part of Mimecast) uses a static analysis which is faster, more accurate, not OS version dependent and covers 100% of your code, with complete visibility.  With SoleGATE, every line of code is evaluated, making Sandbox evasion techniques ineffective. The platform is agnostic to file type, client-side application type, or the client operating system used within the organization. Unlike a Sandbox which has to simulate specific customer environments, SoleGATE provides protection regardless of operating system, CPU architecture, and function (client, server) of the targeted machine.

The Solebit solution uses Multi-Tier protection to defend against attacks at different levels of the stack. This comprehensive approach is powerful, as evasion techniques may spread across different layers. The solution protects against advanced malware by using Solebit deep inspection that analyzes commands at the CPU level, all the way up to the application level, analyzing macros and embedded JavaScripts in Microsoft office or any other data file types.

See for yourself what SoleGATE can do to deliver evasion proof security for your organization today. Register for a free trial today.

 

Recent Posts