Successful attackers routinely use evasion to evade baseline anti-malware tools and ultimately compromise endpoints. Evasion techniques involve shunning automated analysis environments, concealing malicious code inside document files that exist solely in memory of otherwise-legitimate applications. How can enterprises prevent such intrusions without relying on after-the-fact detection?
This webcast will explain a unique approach to preventing evasive malware from infecting endpoints. Learn how Minerva's Anti-Evasion Platform automatically blocks threats without ever scanning files or processes. Instead, it simulates an environment in which malicious software "decides" not to run or is otherwise rendered ineffective. After the malware fails to execute, Minerva captures useful, and often never-before-seen, threat intelligence that enterprises can integrate with other security functions.
In addition, see how Minerva's solution stands up against a series of attack technologies that attempt to bypass anti-malware tools, including forms of:
SANS Reviewer Eric Cole, PhD, will explain the types of malicious software that succeeded at bypassing traditional and next-generation endpoint security tools. He will share his findings regarding the ability of Minerva's Anti-Evasion Platform to block such evasive threats. He will also discuss how Minerva's solution interacted with other endpoint security controls to stop attack attempts and derive new intelligence.
Attend this webcast and be among the first to receive access to Eric Cole's accompanying white paper about combating evasive malware.
View the associated white paper here.