AI-based malware detection

August 2019 Perimeter Security, Alarms & Intruder Detection, Cyber Security

Check Point Software Technologies has introduced a new artificial intelligence-based malware detection engine to its SandBlast Network threat prevention solution, to enable faster, more accurate prevention of malicious attacks. The new Malware DNA engine classifies new forms of malware into known malware families, accelerating the ability to identify and block zero-day threats before they can cause any damage.

Malware DNA scans each malware variant that passes through the Check Point SandBlast Network sandbox to find code patterns and behavioural similarities that match existing, known malware families. As the overwhelming majority of malware is built using existing blocks of malicious code, Malware DNA accelerates identification of new, previously undiscovered malware and reduces response times to further strengthen organisations’ security postures.

Malware DNA’s AI and machine-learning processes are supported by intelligence on the millions of malware samples already detected by Check Point’s ThreatCloud. The new engine augments SandBlast Network’s detection, inspection and safe content delivery capabilities to deliver complete protection against the most dangerous zero-day and targeted attacks on enterprise networks.

“For hackers, reusing existing code that is already proven to work saves them time and effort, so the overwhelming majority of malware is created this way. The lines of code that make up malware are the DNA of cyber threats, and the new Malware DNA engine enables the code used in even brand-new malware to be quickly matched to existing families of threats,” said Maya Horowitz, head of threat intelligence research at Check Point. “By quickly tracing the origins of even new, zero-day threats, response times are accelerated even further, reducing the risks to organisations.”

SandBlast Network is a complete network threat prevention solution. It detects evasion-resistant malware to keep organisations’ networks threat-free, and ensures shared content is safe to use throughout your organisation, maximising users’ productivity. SandBlast Network is an integral component of Check Point’s consolidated cybersecurity architecture, Infinity, which protects all facets of modern IT, including the network, endpoints, cloud, and mobile. It uses real-time threat intelligence from Check Point’s ThreatCloud knowledge database to continually monitor for threats across all platforms through a single pane of glass.

NSS Labs, a trusted source for independent, fact-based cybersecurity testing, gave a ‘recommended’ rating to Check Point’s SandBlast solution for detecting 100% of HTTP and email threats, and 100% of malware using sophisticated evasion techniques, while giving zero false positives.

For more information, go to www.checkpoint.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Read more...
Utility outages: Are you looking at the big picture?
October 2019 , Perimeter Security, Alarms & Intruder Detection
We have to start thinking about, and laying plans for, the real possibility that the whole grid is somehow compromised.

Read more...
Kaspersky uncovers zero-day in Chrome
October 2019, Kaspersky , News, Cyber Security
Kaspersky’s automated technologies have detected a new exploited vulnerability in the Google Chrome web browser.

Read more...
What are the cybersecurity issues in video surveillance?
November 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
he importance of the data captured by surveillance cameras – and what can be done with it – has led to a new breed of cybercriminals, looking for insights to steal and sell.

Read more...
Cyber-securing your surveillance infrastructure
CCTV Handbook 2019, Genetec, Hikvision South Africa , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
When it comes to cybersecurity, understanding the risks and the solutions as well as engaging in open communication helps everyone.

Read more...
Keeping your things to yourself
October 2019, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Three experts spoke to Hi-Tech Security Solutions to offer advice on keeping your IoT working for you and not for cyber criminals.

Read more...
IoT in security
October 2019, Duxbury Networking, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Using the Internet of Things is not really optional these days, but securing the Internet of Things is compulsory, no matter what industry you operate in.

Read more...
Perimeter protection in Ghana
October 2019, AcoustAlert , Mining (Industry), Perimeter Security, Alarms & Intruder Detection
A gold mine in Ghana has erected a dual fence with AcoustAlert PIDS fence detection on both inner and outer fence lines.

Read more...
NFa2p security certification
October 2019 , News, Cyber Security
Advisor Advanced obtains the highest level of certification to the NFa2p Electronic Security Standard for a complete security system.

Read more...
A committed service provider
October 2019, Elf Rentals - Electronic Security Solutions , Perimeter Security, Alarms & Intruder Detection, Residential Estate (Industry)
The theme Elf promoted through its sponsorship was that it offers clients its own financial commitment and willingness to accept the risk of equipment failure.

Read more...