Remote User Protection
As the workforce becomes more distributed and employees prefer to work with their own private devices, enterprises are challenged with how to create a remote yet secure connection for its workforce, contractors, and third party vendors who connect over VPN. In many cases, these individuals access sensitive resources from systems whose security configuration the enterprise does not directly control, either because they are user-owned devices or because they’re owned by another organization. What precautions can organizations take to safeguard the enterprise from malware infections?
Minerva Labs’ Remote User Protection helps enterprises prevent malware-infected systems connecting over a VPN. By integrating with the organization’s VPN software, it initiates a scan of the remote system’s processes for malware before allowing the connection to be established and continues to monitor the endpoint for in-session attacks. If active malware is identified, Minerva will not allow it to connect or will terminate the session immediately. This approach reinforces the security mechanisms that might exist on the remote system without conflicting with other security tools or interfering with the user’s day-to- day activities.
Adds a layer of defense to remote endpoints and protects enterprises without installing anything on the endpoint
Similar experience to connecting over VPN without down the remote user’s system.
Doesn’t conflict with security or other non-malicious software on the remote system.
Provides safeguards against vast numbers of known malware that would otherwise put the enterprise at risk.
Read more on how Minerva can help you improve your incident response.
The effectiveness of fileless attacks on the endpoint is keeping many security professionals busy. Since such malware doesn’t write itself to disk, it is highly successful at evading many types of detection, as this is where many security technologies usually look for malware. Even modern endpoint solutions find it hard to spot malware hiding itself in what seems like legitimate processes. From using PowerShell and other administrative tools, to abusing capabilities of web browsers and document files, fileless attacks put endpoints at risk.
Minerva Labs’ Memory Injection Prevention capabilities block fileless and other memory- resident malware from compromising endpoints. Rather than trying to detect fileless threats, Minerva tricks them regarding their ability to access needed resources, such as PowerShell or the targeted process. This stops the attack before any damage is done.
Minerva’s underlying approach is about tricking malware as to its environment to block an attack. Fileless malware does not write anything to disk, rather it tries to hide in memory. By analyzing the series of actions that a piece of code does we will be able to intercept the malicious code and respond with a ‘out of memory space’ or ‘access denied to powershell’ and as such block the attack
before it starts. This, as you know, is in contrast to how other vendors are approaching fileless
malware which is detection-based, relying on behavioral patterns to detect fileless patterns.
This drains resources and results in false positives. Minerva’s passive solution causes malware to break if it attempts to exhibit fileless properties, including attempts to interact with legitimate programs in malicious ways, and attempts to inject code into trusted applications. Minerva ensures that the only code that runs in memory is the code that originated from disk, making fileless attacks ineffective.
Key benefits include:
The addition of Minerva Labs to the endpoint security architecture allows enterprises to:
Prevent fileless malware without relying on behavioral patterns that result in false positives and drain resources
A different and effective approach that ensures that only code that runs in memory is the code that originated from disk, making fileless attacks ineffective
A passive solution that doesn’t impact system performance and works on old and new systems
Prevents fileless attacks that even try to hide in legitimate and trusted applications
This webcast will explain a unique approach to preventing evasive malware from infecting endpoints.Watch >>
Discover the reasons why evasion techniques work, even with a layered defense approach and how to evolve your endpoint protection strategy, to cover the gap.Download >>
See how Minerva Labs’ Anti-Evasion Platform performed in the SANS Institute testDownload >>