Resources

AllWhitepapersVideosWebinarsBrochuresCase StudiesResearchSurvey

Whitepaper: The Role of Windows Defender Technologies in an Endpoint Security Architecture

Microsoft's Windows Defender naming can be confusing. With 12 distinct technologies, what role does each play in your endpoint security architecture? What are their dependencies and restrictions?

Download >>

Video: CoinMiners are Evasive

Watch Omri Moyal, Co-Founder & VP Research at Minerva Labs and Thomas Roccia, Security Researcher at McAfee give a deep dive into the uncharted of CoinMiners stealth tactics.

Watch >>

Upcoming webinar: Why Do Malicious Office Documents Keep Infecting Me?

Register to learn what you can do to stop malicious office documents from infecting your endpoints and reduce your organization's vulnerability.

Register Now >>

Solution Brief: Combating Modern Exploit Kits with Minerva

Modern exploit kits incorporate evasion tactics to avoid analysis, which makes Minerva’s Anti-Evasion Platform especially effective at protecting enterprises from such threats.

Download >>

GhostMiner: Cryptomining Malware Goes Fileless

Cybercriminals are increasingly relying on malicious cryptominers as a way of making money online, often shifting from using ransomware or diversifying revenue streams.

Read more >>

Why “Next-Gen AV” is just “AV”

In the world of antivirus the idea of “next-gen” AV is confusing at best. But is it ready to take on the challenge of ‘next-gen’ threats?

Read more >>

Confronting Snake Oil Sales Tactics in Endpoint Security

How can you validate the efficacy claims of endpoint security vendors? Here's a free tool to help you out.

Read more >>

Security Weekly Webcast: The State of EDR

Watch this webcast with Lenny Zeltser, Mike Nichols, Mike Scutt, & Paul Asadoorian to learn how to conduct a proper evaluation of your endpoint security strategy.

Watch >>

Webinar: A CISO's 7 Rules For Evaluating Security Solutions

Join James Rutt, CIO at The Dana Foundation, as he shares his 7 rules for evaluating security solutions and how these apply to different security solutions he recently implemented in the organization.

Watch >>

Video: GhostMiner: Cryptomining Goes Fileless

Watch Security Researcher Asaf Aprozper dissect the GhostMiner campaign and explains how fileless malware techniques were used to launch a cryptomining campaign that went undetected by most AV vendors.

Watch >>

Webinar: The State of Endpoint Security in Addressing Malware

Watch Lenny Zeltser, Minerva’s VP of Products, as he reviews our recent survey’s findings and shares his analysis of the responses.

Watch >>

Customer Brief: Dana Foundation adds Minerva as part of their endpoint cybersecurity program

Learn what James Rutt, The Dana Foundation CIO, had to say about MInerva's ability to prevent evasive attacks without overlapping with the existing defensive measures.

Download >>

Video: Lenny Zeltserand Eddy Bobritsky’s interview with Enterprise Security Weekly

Watch Security Weekly's recent interview with Lenny Zeltser and Eddy Bobritsky and learn how to test and evaluate endpoint security products.

Watch >>

Survey - The State of Endpoint Security in Addressing Malware and Other Modern Cyber Threats

Download the Minerva Labs 'State of Endpoint Security 2018' survey to discover what 600 IT Security Professionals are challenged with when it comes to addressing malware and other modern cyber threats.

Download >>

Webinar: The Rise of Malicious Cryptomining | May 2nd, 1:00 pm EST

Join Omry Moyal to learn practical tips and tricks on how to block malicious cryptominers.

Watch >>

Whitepaper: Malware and the Hidden Cost of Adding Security to Your MSP Practice

Discover the challenges and opportunities MSPs are facing with putting essential security in place, how to avoid the hidden costs and ensure reliability, predictability, productivity, and profitability.

Download >>

Webinar: The MSPs Guide to Setting Up Cost-Effective IT Security

Join Lenny Zeltser who will share his expertise in this field and explain the role that MSPs can play in safeguarding customers’ IT infrastructure.

Watch >>

Customer Brief: BlueVoyant Partners with Minerva Labs

Cybersecurity Services firm BlueVoyant partners with Minerva Labs to contain sophisticated malware attacks.

Download >>

Video: Boosting your endpoint security ecosystem

Evasive malware can easily hide in packers to avoid your endpoint security solutions. See how Minerva prevents fileless attacks and adds a critical defense layer to your endpoint security stack.

Watch >>

Solution Brief: Malware Protection for ATMs

Minerva provides reliable and comprehensive safeguards against ATM malware.

Download >>

Webinar: How to Evaluate Endpoint Security Products

Get practical tips and tricks for evaluating endpoint security prevention and detection products. We'll share our expertise in malware defenses and product testing.

Watch >>

Solution Brief: Minerva Labs for Incident Response

Deploying Minerva’s Anti-Evasion Platform as part of the incident response process helps contain the threat automatically and quickly.

Download >>

Solution Brief: Minerva Labs Remote User Protection

Remote User Protection enables malware-free VPN connections, protecting enterprises from attacks upon initiation of, or during a remote connection.

Download >>

Video: Lenny Zeltser’s interview with Enterprise Security Weekly

Watch Lenny Zeltser's interview with Paul Asadoorian and John Strand from Security Weekly about Minerva's Anti-Malware solution

Watch >>

Webinar: Covering the AV Gap -The Role of Anti-Evasion and Other Approaches

Understand the pros and cons of various AV augmentation technologies and discover how anti-evasion improves your security posture in a meaningful way.

Watch >>

Evasive malware: How and why your anti-malware strategy needs to evolve beyond Anti-Virus

Discover the reasons why evasion techniques work, even with a layered defense approach and how to evolve your endpoint protection strategy, to cover the gap.

Download >>

Malicious Document Prevention

Prevent attacks that hide in malicious documents and safely use the full capabilities of day-to-day business apps.

Download >>

Minerva Labs Research Report: 2017 Year in Review

End of the year offers an opportunity to reflect upon the key events that have shaped 2017 and set the direction for 2018.

Download >>

Infographic: 2017 - The Year Malware Went More Evasive

Here are the key takeaways of Minerva’s research into the malware families that were prevalent in 2017.

Download >>

A SANS Institute Product Review

See how Minerva Labs’ Anti-Evasion Platform performed in the SANS Institute test

Download >>

Webinar: A Year in Review, 2017 Through the Eyes of Minerva Labs

Join Gal Bitensky, Minerva Labs' Senior Security Researcher, who reviews the key trends of 2017, their lasting impact and how these could influence what happens in 2018.

Watch >>

Solution Brief: Minerva Safeguards VDI Environments from Unknown Threats

See how Minerva’s Anti-Evasion Platform makes it highly effective for safeguarding Virtual Desktop Infrastructure environments and individual virtual desktops.

Download >>

Customer Brief: Worldwide Shipping Company Guards Thousands of Endpoints Against Ransomware

Minerva Labs blocked more than 95% of attempted attacks. As a result of fewer infections, investigations and reimaging were avoided, saving significant time and resources.

Download >>

SANS Webinar - Using Anti-Evasion to Block Stealth Attacks

This webcast will explain a unique approach to preventing evasive malware from infecting endpoints.

Watch >>

Video: Integrating Minerva Anti-Evasion Platform with McAfee

Watch a demo of how Minerva Labs Anti-Evasion Platform boosts your endpoint security when integrated with McAfee and enhances your investment

Watch >>

Solution Brief: Minerva for Critical Infrastructure

Malicious attacks on industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA) environments are on the rise.

Download >>

Whitepaper: Making Sense of Endpoint Security

For security architects, endpoint security can be a confusing space. We will make sense of the options available to organizations seeking to improve their endpoint security.

Download >>

Video: Eddy Bobritsky’s interview with SecurityGuyTV at #SANS Network Security, Las Vegas

Check out Eddy Bobritsky’s interview with huck Harold of SecurityGuyTV about Minerva's Anti-Evasion platform and the NEW Malware vaccination module

Watch >>

Whitepaper: The Past, Present & Future of Endpoint Malware Vaccination

Read this whitepaper and get a brief history of endpoint malware vaccination and how incident response teams can immunize endpoints in moments to contain outbreaks.

Download >>

Webinar: Safeguarding Endpoints with Vaccination

Learn more about how to immunize endpoints in moments by simulating infection markers across all enterprise endpoints.

Watch >>

Brochure: Endpoint Malware Vaccination

Prevent outbreaks & contain threats by simulating infection markers on endpoints

Download >

Customer Brief: ECI Relies on Minerva’s Innovative Malware Prevention Solution

ECI’s internal cyber security program has to be exemplary to ensure no internal breaches.

Download >>

Brochure: Ransomware Protection for Apple macOS

Adversaries have recognized that Apple macOS systems present a new lucrative market and revenue stream.

Download >>

Video: Preventing the Exploitation of Outlook Forms

Fileless attacks are on the rise. See how one of the latest attacks is prevented where detection tools failed.

Watch >>

Webinar: How to Beat Evasive Malware at Its Own Game

Learn more about how to turn malware strengths into weaknesses by using a deception approach on endpoints.

Watch >>

Video: Stop NotPetya with a prevention-first approach

In June 2017, a new variant of ransomware, now dubbed NotPetya, was used for a global cyber-attack. Minerva's Anti-Evasion Platform blocks NotPetya's malicio...

Watch>>

Brochure: Ransomware Protection

Learn how to stop time on ransomware and avoid paying the ransom.

Download >>

Brochure: Anti-Evasion Brochure

Block unknown threats that are designed to evade your existing defenses

Download >>

Video: Eddy Bobritsky’s interview with Paul Asadoorian of Security Weekly

Check out Eddy Bobritsky’s interview with Paul Asadoorian of Security Weekly about where people should focus their efforts in endpoint threat protection, detection and reaction.

Watch >>

Webinar: Evasive malware is everywhere

Learn more about evasive malware in our webinar co-hosted with SANS Institute.

Watch >>

Video: Cybox Cybertech 2016

Eddy Bobritsky, Minerva Labs CEO, presents Minerva Labs' solution at the Cybertech 2016 Cybox contest.

Watch >>

Video: Demo #3 - IronGate

A demonstration of IronGate, a SCADA targeted malware.

Watch >>

Video: Demo #1 - Packed Petya

A demonstration of the Petya ransomware combined with a common packing technology.

Watch >>

Video: Demo #2 - Evasive Ransomware

Here we demonstrate of the Locky ransomware using evasive techniques

Watch >>

Video: Ransomware - A Threat Prevented

Comparison and demonstration of two environments

Watch >>

Video: Minerva Intro

Minerva give the CISO a peace of mind by preventing cyber-attacks without the need for prior detection.

Watch >>

Whitepaper: Introduction to Evasive Techniques

Evasion techniques are a set of malware capabilities that evolved as a result of the need to avoid execution within a hostile environment.

Download >>

Brochure: Memory Injection Prevention

Minerva offers a unique solution that prevents and mitigates memory injection attacks

Download >>

Whitepaper: Minerva’s 2016 Year in Review

This paper will go through the prominent cases the team observed during 2016 providing a wider perspective to the reader.

Download >>

Stop the cyber security race