Top Threat Vectors these technologies protect against:
- Drive-by Downloads and Web Attacks
- Social Engineering Attacks – FakeAV and Fake Codecs
- Bots and Botnets
- Non-Process and Injected Threats (NPT)
- Targeted Attacks including Advanced Persistent Threats (APT), Trojans and general Malware Zero-day threats
- Malware as the result of drive-by downloads that bypassed other layers of protection
- Malware uses rootkit techniques to hide malware
This eco-system is comprised of the following five areas that work in collaboration:
- File-Based Protection continues to play a major role in protection due to new innovations in static file heuristics.
- Network-Based Protection detects when both known and unknown vulnerabilities are used to enter your devices’ system.
- Behavior-Based Protection looks at the dynamic behavior of malicious activity rather than static characteristics.
- Reputation-Based Protection examines the meta-information of a file – its age, origin, how it travels, where it exists, etc.
- Remediation is a set of technologies that can help clean up an infected devices system.
The technology collaborates and operates more efficiently and effectively to discover if a given situation is malicious or not. As each technology learns different things about a process or a file, it will share what it learns with the other technologies.