Protect your organisation from malware, ransomware and phishing attacks
Malware, shorthand for malicious software, is the collective name for malicious content including viruses, ransomware and spyware, with the aim of causing disruption and damage to a target.
Our network monitoring and intrusion detection products and digital forensic solutions help our customers to identify types of malware in high-rate network traffic flows allowing them to protect their perimeters, detect malware and prevent their devices and operating systems from becoming infected with malware.
Types of Malware include:
Ransomware is a type of malware designed to prevent access to a system or its data until a ransom has been paid to release it. Infamously Ransomware was brought into public knowledge in 2017 as a number of large organisations around the world were hit by the WannaCry outbreak resulting from the EternalBlue weakness.
Spyware is a type of malware that infiltrates systems to monitor activity in order to trigger malicious activities, or steal data and sensitive information. Some examples of spyware threats include CoolWebSearch, Gator (GAIN) and 180 search assistant. It is difficult to get rid of as you may not be aware you have it!
Trojan’s, the name being borrowed from the story of the Greek’s invasion of Troy using a hollow wooden horse, refers to code that looks legitimate on the outside but on the inside allows an attacker to insert malware on the target system.
Virus malware self-replicates and spread by attaching themselves to legitimate files and programs. They are often distributed from infected websites, flash drives and e-mails. Viruses cannot spread by their own accord and are instead injected into existing applications to carry out its mission.
A worm is a standalone malware that operates as a self-contained application that can transfer and copy itself between devices. It differentiates itself from other malware by its ability to operate autonomously without the need for a host file or to hijack code on the device. They are often using part of a device that is invisible to the user.
400GBPS FlowProbe: Network Traffic Monitoring
Monitor real time traffic information and network performance whilst using anomaly detection to maintain cyber security with our ultra high performance 4x 100GbE network traffic monitor.
100GBPS CERNE: INTRUSION DETECTION
100 Gbps IDS engine and alert driven packet recorder that enables 24/7 real-time network threats monitoring and access control.
400GBPS TRITON: CYBER WARFARE SIMULATION
Prove and enhance your cyber security posture with our Cyber Warfare Simulation tool and our world class SLA and advanced on-site/ off-site support.
TDAC: Digital Forensics
Unlocks network visibility and threat identification
UNCOVERING MALWARE IN HYPER-SCALE DNS TRAFFIC
Tools like the FlowProbe which are able to extend network visibility at scale in to Layer 7 monitoring will greatly increase the detection of malware in your network.
THE RISE OF THE BOTNET
Over the previous several years, the steady growth of IoT and connected devices has resulted in botnet attacks growing in number and becoming much more of a serious threat to networks.