Combining Network and Endpoint Defenses
to Stop Malware
Advanced threats easily bypass signature-based detection solutions such as antivirus software and network-based intrusion prevention systems. To successfully prevent, detect, and contain advanced cyber threats, enterprises need multi-layered defenses at both the network level and the endpoint. This “kill chain” defense collects and correlates attack intelligence, identifies anomalies, and challenges malware at each step of an attack. By integrating network and endpoint defense mechanisms, security organizations can quickly investigate, confirm, and stop advanced threats.
The Digital Guardian Solution
Fortra™’s Digital Guardian® Digital Guardian is a scalable platform that protects intellectual property and other sensitive data against insider threats and outsider malware attacks. Digital Guardian provides visibility into data movement to detect malware and it provides controls to prevent malware from compromising critical systems and data.
Unlike antivirus software that can only detect known threats, Digital Guardian detects and blocks malware behavior as it unfolds in real time. Digital Guardian even protects host systems when users are off the company network and unprotected by corporate network defenses. Digital Guardian recognizes and correlates compound process events from system, application, and user activity, including:
- Process activity - including file and network access, and starting and stopping processes
- Data events - including file operation type, destination, and classification of file
- System context - including user, application, time, OS, and network
Digital Guardian also provides a wide range of policy controls to stop malware and protect sensitive information:
- Block code from executing
- Block access to files and networks
- Alert administrators and incident response teams to policy violations and malicious activity
- Prompt users to acknowledge company policies and justify their actions
- Encrypt sensitive data automatically based, based on policy, user permissions, and activity
Digital Guardian uses a broad set of malware detection rules to identify malware threats without using signatures. Unlike application whitelisting, which can only compare process characteristics to a predefined list, Digital Guardian correlates individual system, application, and data events against a proprietary set of rules to establish the risk level of process actions and detect malware activity. Based on the risk level, Digital Guardian can implement control responses ranging from passive alerting, to blocking process actions, to locking down the host.
FireEye Malware Protection System
FireEye has developed a purpose-built, virtual machine-based security platform that provides real-time threat protection against the next generation of cyber-attacks. The FireEye platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including web, email, and files. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber-attacks in real time.
FIREEYE AND DIGITAL GUARDIAN 1+1=3
The Digital Guardian server receives FireEye Alerts and converts new IOC discovered by FireEye into rules for endpoint agents to confirm the extent of an infection, quickly contain that infection, and block new infections.
Further, Digital Guardian can submit suspicious malware artifacts collected on host systems for analysis in the FireEye Malware Analysis System (MAS). Results of the analysis are passed back to Digital Guardian for containing and preventing new infections.
Validate & Report the extent of FireEye discovered threats within the endpoint estate. Contain existing endpoint infections and Prevent further endpoint infections.
When FireEye discovers a new threat on the network, administrators need to determine if another layer of defense has already stopped the threat, and if not, which endpoint systems the threat has reached and infected. FireEye passes IOCs of detonated threats to Digital Guardian, which automatically deploys rules to enable administrators to track if and where the malware has landed, create containment and prevention rules, and accurately report the extent of the incident and its containment. These containment rules include the ability to lock down the endpoint to stop malware from infecting other computers on the network, block access to sensitive data, prevent exfiltration, and prompt the user to warn of an infection.
Correlate FireEye and Digital Guardian events in the HP ArcSight SIEM to verify whether an incident is under control at the endpoint.
Many customers aggregate security events in the ArcSight SIEM. Correlating different indicators of malware activity from the network and host systems in ArcSight allows security organizations to recognize threats faster. In ArcSight’s single pane of glass, security operations teams can respond to alerts from Digital Guardian, FireEye, and third-party systems. The ArcSight Action Connector for Digital Guardian initiates the conversion of correlated alerts into prevention and containment rules.
Upload suspicious executables and documents captured on the endpoint by Digital Guardian to the FireEye Malware Analysis System (MAS) for analysis to prioritize the incident and respond appropriately.
When Digital Guardian detects malware activity through its Cyber Defense Rule set, it captures relevant documents and executables created by suspicious processes. These files can be automatically submitted to the FireEye MAS service for analysis. FireEye MAS then returns the IOCs discovered through detonation for monitoring and containment on the endpoint by Digital Guardian.