Home / / Sourcefire delivers ‘unprecedented’ malware view

Sourcefire delivers ‘unprecedented’ malware view

New additions to Advanced Malware suite allow enhanced view of threats

Sourcefire delivers ‘unprecedented’ malware view
Roesch: Even [the most diligent organisations] realise that breaches are entirely too likely in the face of modern threats.

Cyber security specialist Sourcefire Inc today introduced new malware trajectory capabilities across its Advanced Malware Protection portfolio, designed to give customers detailed visibility into malware attack activity and enable them to detect, remediate and control malware outbreaks.

"With these additions, Sourcefire Advanced Malware Protection solutions are the only offerings that add a continuous capability to its malware blocking, going beyond point-in-time detection to confirm an infection, trace its path, analyse its behavior, remediate its targets and report on its impact regardless of when a file is determined to be malware," Sourcefire said.

"Even organisations which are diligent in their security measures realise that breaches are entirely too likely in the face of modern threats and they need solutions that help them deal with malware before, during and after an attack," said Martin Roesch, Sourcefire founder and CTO.

"The enhanced trajectory features in our Advanced Malware Protection portfolio provide customers with decisive insight when a breach occurs and extend Sourcefire's innovative Retrospective Security with the ability to immediately locate and eradicate malicious files everywhere they surface."

Sourcefire's new Network File Trajectory and Device Trajectory capabilities are designed to allow users to quickly determine the scope of an outbreak and track malware or suspicious files across the network and at the system level. The new features are aimed at enabling security personnel to quickly locate malware point-of-entry, propagation and behavior.

"This is an innovative component of Sourcefire's revolutionary Retrospective Security, which allows organisations to quickly identify scope, track, investigate and remediate malware, even when malicious files are originally deemed ‘safe' or ‘unknown'," Sourcefire said.

Network File Trajectory is designed to track malware across the network, providing detailed information on point of entry, propagation, protocols used, and which users or endpoints are involved. This is available as part of Sourcefire's Advanced Malware Protection for FirePOWER software license, a subscription that can be added to next-generation intrusion prevention systems (NGIPS) or a next-generation firewall (NGFW), or as a dedicated appliance, both of which provide advanced malware protection for networks.

Device Trajectory builds upon existing endpoint File Trajectory capabilities to deliver critical analysis of system level activities, file origination and file relationships for root cause and forensic analysis to track and pinpoint behaviors indicating a compromise has happened and a breach has most likely occurred. Device Trajectory is available as part of the FireAMP host-based protection available for endpoints and virtual networks.

Sourcefire is further enhancing FireAMP with new indicators of compromise and device flow correlation capabilities, which enable users to correlate seemingly benign and unrelated events, while also monitoring device activity and communications to uncover potential malware.

Follow us to get the most comprehensive IT Security news delivered fresh from our social media accounts on Facebook, Twitter, Youtube, and listen to our Weekly Podcast. Click here to sign up for our weekly newsletter on curated technology news in the Middle East and Worldwide.