Solve the most
Directly triggered and powered via
USB interface. Compatible with
Windows® and Linux.
Multi-color, field programmable
LED signal tower with Ethernet
Circle 320 on card or visit www.nedinfo.com/70195-320
Stocking Up for the Cybersecurity Arms Race
You may not think you’re vulnerable to a malware attack, but the variety of
attacks are on the rise and all it takes is one click to let them in. An AI-powered
platform available for mid-tier businesses has the tools to give you the edge.
by John Hitch
SONICWALL CAPTURE CLOUD PLATFORM
Cybersecurity device manufacturer Sonic Wall has about 1 million units in the feld, each a sentry always on the lookout for malware attempting to infltrate enterprise
systems. In 2017, the Sonic Wall Capture Labs team says
these frewalls out in the feld logged 9. 32 billion attacks, an
average of 25 attempted attacks per day per device.
While big name “celebrity” malware, such as WannaCry,
the Mirai DDoS botnet, or the Intel processor exploit
known as Meltdown make the most headlines, the next
major threat to your company might be a completely
unknown strain. And if you aren’t protected, the results
could be catastrophic.
“One could impact a business by $1 or 2 million,”
says Sonic Wall CMO Bob VanKirk. “How many businesses can weather that and come out the other side?
Can they really afford to be down for a week or two?”
Those are worst case scenarios, and maybe you’ll
catch it in time to mitigate the damage. But cyberattacks should be seen less like getting struck by lightning
and more like cancer.
In March, nearly a year after WannaCry’s patches came out,
Boeing found the virus, believed to be a stolen NSA exploit, in
their South Carolina plant.
“It is metastasizing rapidly out of North Charleston and I just
heard 777 [automated spar assembly tools] may have gone
down,” wrote chief engineer Mike Vander Wel to employees. By
that evening, all was contained and no severe damage was done.
But that’s one of the world’s most advanced companies
patching a well-known virus. It won’t always be that easy.
The 2018 Sonic Wall Cyber Threat Report found a 101%
increase in malware variants, despite the number of detected
ransomware attacks dropping from 638 million to 184 million.
“The security landscape is changing at a torrid pace,” says
Sonic Wall CMO Bob VanKirk. “In some cases, we see versions
of ransomware morphing twice a day. It really takes a level
of sophistication to be able to understand this and protect
an organization properly.”
What’s more, the attack surface expands every time a
company connects a new sensor or piece of equipment to
their Industrial Internet of Things network. The Capture Teams
also identifed encrypted traffc as a possible channel for new
threats, because they can bypass traditional security controls.
“We are in a cyber arms race,” VanKirk says. “There have
been advances on the good side, but we recognize there are
constantly advances on the cyber-criminal side.”
Sonic Wall believes the only way to stay one step ahead,
especially for business that can’t afford a dedicated IT team, is
by using automated real-time breach detection and prevention.
They developed their next generation Sonic Wall Capture Cloud
Platform with the intent not to barely outrun attackers, but to
lap them and give a swift kick in the behind as they pass by.
The platform features integrated threat intelligence, workfow
automation, zero-touch deployment, fexible reporting, intelli-gence-driven analytics, and scalable cloud architecture.
“When you look at the number of attacks, you really need to
have something that leverages machine learning AI to handle
that amount of volume and new variants that are constantly
coming out,” VanKirk says.
The platform’s strongest new tool to do this is called the
Real-Time Deep Memory Inspection Technology and Engine
(RTDMI). The proprietary innovation, employed in the Capture
ATP catches and quarantines infected fles, such as Meltdown
exploits, mass-market, zero-day threats, and unknown malware.
It works by pulling an Inception-level trick on the bad bug, making it think a sandboxed “dream” is the real operating system.
“At a very high level, it takes an unknown fle, loads it into
a sandbox, then—using variety of automated techniques—our
systems basically fast forward the application to look for faws,”
explains John Gordineer, director of product marketing, and
former product line manager at the company.
The RTDMI sometimes has less than a 100-nanosecond
window to detect the malware’s weaponry.
“A lot of times malware will try to evade detection,” Gordineer
says. “If it determines it’s in a sandbox environment, it will
refuse to detonate. By using memory, we can force it to reveal
all of its techniques. We basically take over that application
like it’s a puppet and make it do whatever we want it to do.”
Like its hardware, Sonic Wall says its Capture Cloud Platform
is affordable for mid-tier manufacturers to optimize its array of
frewalls. You know you probably will need it someday, just like
a 22-year-old knows they will need health insurance someday.
But if you feel great and none of your friends are sick, you risk it.
Grown adults, though, are forced to look at the worst case
scenario, and with cyberattacks, even a tiny exploit can shatter
a giant operation.
“If Meltdown gets into the Io T infrastructure, it can be
catastrophic,” VanKirk says.
For the full article, visit:
NewEquipment.com/ Sonic Wall-Cybersecurity