Rapid deployment of remediation signatures.To prevent potentially malicious files from entering the network, files sent to the cloud service for analysis can be held at the gateway until a verdict is determined. In addition, administrators can manually submit files to the cloud service for analysis. Administrators can customize protection by selecting or excluding files to be sent to the cloud for analysis by file type, file size, sender, recipient or protocol. The service supports analysis of a broad range of file sizes and types, including executable programs (PE), DLL, PDFs, MS Office documents, archives, JAR and APK, plus multiple operating systems. The multi-engine sandbox platform, which includes virtualized sandboxing, full system emulation and hypervisor-level analysis technology, executes suspicious code and analyzes behavior, provides comprehensive visibility to malicious activity while resisting evasion tactics and maximizing zero-day threat detection. Suspicious files are sent to the SonicWall Capture cloud service for analysis. The firewall inspects traffic, and detects and blocks intrusions and known malware. SonicWall Capture Service extends firewall threat protection to detect and prevent zero-day attacks. Customers benefit from high-security effectiveness, fast response times and reduced total cost of ownership. Global threat intelligence infrastructure rapidly deploys remediation signatures for newly identified threats to all SonicWall network security appliances, thus preventing further infiltration. The solution scans traffic and extracts suspicious code for analysis, but unlike other gateway solutions, analyzes a broad range of file sizes and types. ![]() ![]() This service combines multi-layer sandboxing, including full system emulation and virtualization techniques, to analyze suspicious code behavior. To protect customers against the increasing dangers of zero-day threats, SonicWall Capture Advanced Threat Protection Service - a cloud-based service available with SonicWall firewalls - detects and can block advanced threats at the gateway until verdict. For effective zero-day threat protection, organizations need solutions that include malware-analysis technologies and can detect evasive advanced threats and malware - today and tomorrow.
0 Comments
Leave a Reply. |