By focusing on cloud-based automated systems and processes, Lastline has developed the technology to analyze advanced malware at an unprecedented speed and volume. This gives Lastline the ability to analyze binaries and web content in real-time as it enters the Enterprise network, as well as the ability to map the Malscape at a level of accuracy and relevance not previously available. Lastline's higher level of accuracy and attention to the everyday requirements of IT managers allows for the delivery of actionable threat intelligence to security teams and to companies that rely on managed security services for their protection.Lastline offers the industry’s top network-based defense against targeted, evasive and zero-day attacks. The latest generation of the industry’s first public malware-detection sandbox, Lastline software rapidly deploys and seamlessly integrates into your existing security architecture.
Lastline is recognized by NSS Labs and Forrester as a Leader in Advance Malware Analysis, Detection and Protection. It offers the industry’s top network-based defense against targeted, evasive and zero-day attacks. The latest generation of the industry’s first public malware-detection sandbox, Lastline software rapidly deploys and seamlessly integrates into your existing security architecture.
Deep Content Inspection
- Advanced Attack Tool Evasions - Evasive malware is no longer reserved for government and other strategic targets - in the past two years it has become mainstream.
- Detect and Bypass Evasive Techniques - Evasive techniques has grown significantly, with as many as ten to fifteen techniques observed in a single malware sample.
- Versionless Exploit Detection - Many sandbox products require specific versions of applications to be installed in order to detect malware that could exploit it.
- Dormant Code - If a malicious block of code isn't executed during detonation, most sandboxes can't detect it. Some malware may only run if it finds a specific library or file on the system, or is run with a specific command line. Deep Content Inspection statically matches and correlates patterns of code within the artifact and with other malware seen by Lastline users. The result, even code that isn't executed in the sandbox can be detected.
Video: Investigating Malware Behaviours