MENU

AI-based network protection system blocks viruses, malware

AI-based network protection system blocks viruses, malware

New Products |
By Rich Pell



Saint Security uses PACE 2 deep packet inspection (DPI) software from Rohde & Schwarz Cybersecurity in its network-based advanced malware response system, MNX, to identify, analyze, judge and block malicious activity. By embedding the DPI engine, they unlock the full potential of artificial intelligence-based (AI) analysis methodologies to fingerprint sophisticated cyber-attacks.

The system identifies and blocks various types of malware that cannot be detected by off-the-shelf security. PACE 2 serves as the key enabling feature by extracting file content and metadata to identify potentially dangerous executables caused by APTs. 

“The ability of extracting file content extended the functionality of the network-based advanced malware response solution MNX to analyze all network traffic, services and protocols across all ports with an extremely fine granularity,” says Kihong KIM, CEO of Saint Security. “The extracted information is key to better identify and investigate multi-stage, advanced persistent threats such as malicious emails or ransomware,” adds KIM.

Saint Security’s network protection system intercepts possible APTs at any point in a network. In order to fingerprint malicious activity and to unlock the full potential of their AI-based analysis methodologies, they decided to embed the PACE 2 DPI engine from Rohde & Schwarz Cybersecurity to get a deep understanding of the observed network traffic. 


PACE 2 extracts file content and metadata such as files attached to emails (e.g. .pdf, .exe or .doc) or sent through files transfers from within the traffic in real time. This enables Saint Security to identify potentially dangerous executables caused by APTs and set up advanced security and traffic management policies.

Machine learning and AI are critical to network security as cybercriminals around the world incessantly release new malware types that can morph and look like harmless files. It is almost impossible for antivirus engines to detect these threats as they can bypass legacy security approaches, gain hold within a network and make organizations vulnerable to data breaches.

To find ind out more about the technology: https://ipoque.com/news-media/resources/case-studies/casestudy-threat-analysis.

www.rohde-schwarz.com

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News

Share:

Linked Articles
10s