Resources

AllWhitepapersVideosWebinarsBrochuresCase StudiesResearch

Solution Brief: Minerva for Critical Infrastructure

Malicious attacks on industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA) environments are on the rise.

Download >>

Whitepaper: Making Sense of Endpoint Security

For security architects, endpoint security can be a confusing space. We will make sense of the options available to organizations seeking to improve their endpoint security.

Download >>

Video: Eddy Bobritsky’s interview with SecurityGuyTV at #SANS Network Security, Las Vegas

Check out Eddy Bobritsky’s interview with huck Harold of SecurityGuyTV about Minerva's Anti-Evasion platform and the NEW Malware vaccination module

Watch >>

Whitepaper: The Past, Present & Future of Endpoint Malware Vaccination

Read this whitepaper and get a brief history of endpoint malware vaccination and how incident response teams can immunize endpoints in moments to contain outbreaks.

Download >>

Webinar: Safeguarding Endpoints with Vaccination

Learn more about how to Immunize endpoints in moments by simulating infection markers across all enterprise endpoints

Watch >>

Brochure: Endpoint Malware Vaccination

Prevent outbreaks & contain threats by simulating infection markers on endpoints

Download >

Customer Brief: ECI Relies on Minerva’s Innovative Malware Prevention Solution

ECI’s internal cyber security program has to be exemplary to ensure no internal breaches.

Download >>

Brochure: Ransomware Protection for Apple macOS

Adversaries have recognized that Apple macOS systems present a new lucrative market and revenue stream.

Download >>

Video: Preventing the Exploitation of Outlook Forms

Fileless attacks are on the rise. See how one of the latest attacks is prevented where detection tools failed.

Watch >>

Webinar: How to Beat Evasive Malware at Its Own Game

Learn more about how to turn malware strengths into weaknesses by using a deception approach on endpoints

Watch >>

Video: Stop NotPetya with a prevention-first approach

In June 2017, a new variant of ransomware, now dubbed NotPetya, was used for a global cyber-attack. Minerva's Anti-Evasion Platform blocks NotPetya's malicio...

Watch>>

Brochure: Ransomware Protection

Learn how to stop time on ransomware and avoid paying the ransom

Download >>

Brochure: Anti-Evasion Platform

Block unknown threats that are designed to evade your existing defenses

Download >>

Video: Eddy Bobritsky’s interview with Paul Asadoorian of Security Weekly

Check out Eddy Bobritsky’s interview with Paul Asadoorian of Security Weekly about where people should focus their efforts in endpoint threat protection, detection and reaction.

Watch >>

Webinar: Evasive malware is everywhere

Learn more about evasive malware in our webinar co-hosted with SANS Institute

Watch >>

Video: Cybox Cybertech 2016

Eddy Bobritsky, Minerva Labs CEO, presents Minerva Labs' solution at the Cybertech 2016 Cybox contest.

Watch >>

Video: Demo #3 - IronGate

A demonstration of IronGate, a SCADA targeted malware.

Watch >>

Video: Demo #1 - Packed Petya

A demonstration of the Petya ransomware combined with a common packing technology.

Watch >>

Video: Demo #2 - Evasive Ransomware

Here we demonstrate of the Locky ransomware using evasive techniques

Watch >>

Video: Ransomware - A Threat Prevented

Comparison and demonstration of two environments

Watch >>

Video: Minerva Intro

Minerva give the CISO a peace of mind by preventing cyber-attacks without the need for prior detection.

Watch >>

Whitepaper: Introduction to Evasive Techniques

Evasion techniques are a set of malware capabilities that evolved as a result of the need to avoid execution within a hostile environment.

Download >>

Brochure: Memory Injection Prevention

Minerva offers a unique solution that prevents and mitigates memory injection attacks

Download >>

Whitepaper: Minerva’s 2016 Year in Review

This paper will go through the prominent cases the team observed during 2016 providing a wider perspective to the reader.

Download >>

Stop the cyber security race