Intelligent CIO LATAM Issue 03 | Page 55

FEATURE : MALWARE then look at connections , then the endpoint itself and then its path to the cloud . customer ’ s networks three weeks before the first major attack was ever noted .
Without giving away the whole story now , we typically start with the inspection of traffic coming into the network . With 70 % of sessions today being encrypted , we also take a hard look at inspecting that traffic as well . Next , we will look to how we inspect for unknown malware that can ’ t be found by a traditional nextgeneration firewall .
Sandboxing engines have been around since 2011 , and they have evolved to look for malware across multiple engines – including within the memory of the system , since this is where a lot of attacks ( such as fileless attacks ) try to initiate to hide how they got into the network and remain undetected and undeterred by security software .
Would you believe that customers use Capture ATP with Real-Time Deep Memory Inspection ( RTDMI ) to find between 1,400 to 1,600 new forms of malware every business day , many of these with numerous evasion tactics ?
SonicWall has been in IT security for 30 years now , and we have seen it all . We have morphed from a firewall company into a security platform company . We famously stopped WannaCry in its tracks on our
We have found and named several new strains throughout our research and continue to develop new and better technologies to help you discover and stop unknown , zero-day and updated attacks on your own network . p

THESE MALWARE DEVELOPERS MAY

TRANSITION FROM PROJECT TO PROJECT , BRINGING THEIR EXPERTISE AND

EXPERIENCE WITH THEM WHEN DEVELOPING A NEW STRAIN OF MALWARE WITH

A NEW TEAM .

www . intelligentcio . com INTELLIGENTCIO LATAM 55