Sourcefire delivers visibility and tracking of malware

THURSDAY, JUNE 06, 2013
|

Sourcefire Inc has launched innovative malware trajectory capabilities across its Advanced Malware Protection portfolio to give customers detailed visibility into malware attack activity.

The malware trajectory capabilities will also enable customers to detect, remediate and control malware outbreaks, the company announced.
With these additions, Sourcefire Advanced Malware Protection solutions will add a continuous capability to its malware blocking, going beyond point-in-time detection to confirm an infection, trace its path, analyse its behavior, remediate its targets and report on its impact regardless of when a file is determined to be malware. 
“Even organisations which are diligent in their security measures realise that breaches are entirely too likely in the face of modern threats and they need solutions that help them deal with malware before, during and after an attack,” said Sutee Assawasoontarangkoon, Country Manager, Thailand & Indochina, Sourcefire.
“The enhanced trajectory features in our Advanced Malware Protection portfolio provide customers with decisive insight when a breach occurs and extend Sourcefire’s innovative Retrospective Security with the ability to immediately locate and eradicate malicious files everywhere they surface.”
With Sourcefire’s new Network File Trajectory and Device Trajectory capabilities, customers can quickly determine the scope of an outbreak and track malware or suspicious files across the network and at the system level. 
These new features enable security personnel to quickly locate malware point-of-entry, propagation and behavior. This is an innovative component of Sourcefire’s revolutionary Retrospective Security, which allows organizations to quickly identify, scope, track, investigate and remediate malware, even when malicious files are originally deemed “safe” or “unknown,” the company said.
Network File Trajectory is available as part of Sourcefire’s Advanced Malware Protection for FirePOWER software license, a subscription that can be added to a Next-Generation Intrusion Prevention Systems (NGIPS) or Next-Generation Firewall (NGFW), or as a dedicated appliance, both of which provide advanced malware protection for networks.
Network File Trajectory delivers the ability to track malware across the network, providing detailed information on point of entry, propagation, protocols used, and which users or endpoints are involved. This 
Device Trajectory is available as part of the FireAMP host-based protection available for endpoints and virtual networks.
Device Trajectory builds upon existing endpoint File Trajectory capabilities to deliver critical analysis of system level activities, file origination and file relationships for root cause and forensic analysis to track and pinpoint behaviors indicating a compromise has happened and a breach has most likely occurred.
Sourcefire is further enhancing FireAMP with new Indicators of Compromise and Device Flow Correlation capabilities, which enable users to correlate seemingly benign and unrelated events, while also monitoring device activity and communications to uncover potential malware.
Indicators of Compromise (IoC) – Correlates malware intelligence and even seemingly benign events to determine whether a system may have been compromised  – providing users with a prioritized list of potentially compromised devices.