Use Cases

Remote User Protection

Remote User Protection

As the workforce becomes more distributed and employees prefer to work with their own private devices, enterprises are challenged with how to create a remote yet secure connection for its workforce, contractors, and third party vendors who connect over VPN. In many cases, these individuals access sensitive resources from systems whose security configuration the enterprise does not directly control, either because they are user-owned devices or because they’re owned by another organization. What precautions can organizations take to safeguard the enterprise from malware infections?

Prevent malware from attacking VPN Users

Minerva Labs’ Remote User Protection helps enterprises prevent malware-infected systems connecting over a VPN. By integrating with the organization’s VPN software, it initiates a scan of the remote system’s processes for malware before allowing the connection to be established and continues to monitor the endpoint for in-session attacks. If active malware is identified, Minerva will not allow it to connect or will terminate the session immediately. This approach reinforces the security mechanisms that might exist on the remote system without conflicting with other security tools or interfering with the user’s day-to- day activities.

Key benefits:

Read more on how Minerva can help you improve your incident response.

Put a Stop to Fileless Malware

The effectiveness of fileless attacks on the endpoint is keeping many security professionals busy. Since such malware doesn’t write itself to disk, it is highly successful at evading many types of detection, as this is where many security technologies usually look for malware. Even modern endpoint solutions find it hard to spot malware hiding itself in what seems like legitimate processes. From using PowerShell and other administrative tools, to abusing capabilities of web browsers and document files, fileless attacks put endpoints at risk.

A new layer of prevention, not more overlap of solutions

Minerva Labs’ Memory Injection Prevention capabilities block fileless and other memory- resident malware from compromising endpoints. Rather than trying to detect fileless threats, Minerva tricks them regarding their ability to access needed resources, such as PowerShell or the targeted process. This stops the attack before any damage is done. 

Minerva’s underlying approach is about tricking malware as to its environment to block an attack. Fileless malware does not write anything to disk, rather it tries to hide in memory. By analyzing the series of actions that a piece of code does we will be able to intercept the malicious code and respond with a ‘out of memory space’ or ‘access denied to powershell’ and as such block the attack before it starts. This, as you know, is in contrast to how other vendors are approaching fileless malware  which is detection-based, relying on behavioral patterns to detect fileless patterns.

This drains resources and results in false positives. Minerva’s passive solution causes malware to break if it attempts to exhibit fileless properties, including attempts to interact with legitimate programs in malicious ways, and attempts to inject code into trusted applications. Minerva ensures that the only code that runs in memory is the code that originated from disk, making fileless attacks ineffective.

Key benefits include:

The addition of Minerva Labs to the endpoint security architecture allows enterprises to:

Ready to see us in action?


SANS Webinar - Using Anti-Evasion to Block Stealth Attacks

This webcast will explain a unique approach to preventing evasive malware from infecting endpoints.

Watch >>

Evasive malware: How and why your anti-malware strategy needs to evolve beyond Anti-Virus

Discover the reasons why evasion techniques work, even with a layered defense approach and how to evolve your endpoint protection strategy, to cover the gap.

Download >>

A SANS Institute Product Review

See how Minerva Labs’ Anti-Evasion Platform performed in the SANS Institute test

Download >>
See All Resources >>