Historically, antimalware tools rely on information about malware to accurately detect and prevent attacks. Security specialists develop new signatures and distribute to customers regularly. Once the antimalware tools have been updated with the new signatures, the behavior of all known malicious code will be thwarted. For quite a while, this method proved to be very effective. The current trend of malware writers is the prolific production of new variants of existing malware which will be potentially invisible to existing signatures. Over 1 million new malware variants have been observed per day. It is noteworthy that over 90% of existing cyber-attacks utilize malware and this severely challenges the effectiveness of signature-based antimalware tools. Moreover, signature development requires specific knowledge of a malware application. This suggests that as brand-new malware and variants emerge, signatures are subsequently developed, distributed and deployed. This results in a window of opportunity for new, never seen, (also known as zero-day) malware to successfully exploit inadequately protected systems.
The signature model is variously referred to as pattern matching or byte matching which is an apt designation based on the applied methodology. As a model that has been in use for decades, its strengths and weaknesses are well known to security practitioners and adversaries alike. Consequently, contemporary security vendors have enhanced signature technology with other approaches and the most common of these are explained below.
There are multiple approaches to the DiD strategy with diverse nomenclature being used. Notwithstanding this plurality, the fundamental tenant remains – the use of multiple methods of defence measures at different segments to proactively protect and security digital assets.
Cylance:
Cylance is a pioneer of using ML to protect client computers, mobile devices and servers from file-based malware. The Cylance solution utilizes a math engine that divides a single file into an astronomical number of characteristics and analyzes each one against hundreds of millions of other files to reach a decision about the normalcy of each characteristic. This is how the Cylance engine accurately identifies malware — whether packed or not, known, or unknown. The model eliminates the traditional application of signatures and frequent updates.
McAfee:
McAfee is a long standing security vendor for the protection of digital assets and remains among the top three endpoint protection providers according to a Gartner 2018 report. The McAfee Endpoint 10 solution delivers threat protection, firewall and web control modules to protect the data on several types of digital platforms. The structure includes a foundation of common components which service the modules. This structure provides cohesive communication and operation among the modules which significantly enhances performance and security. Endpoints are managed through the award winning ePolicy Orchestrator (ePO) providing security professionals with visibility and control across the IT landscape.
Let TRUSTWORTHY Systems Inc. be the catalyst for risky behavior, change and development of a better digital experience within your organization.