subscribe: Daily Newsletter

 

Sophos blow to cyber-threats with Sandstorm

0 comments

Sophos has announced that its Sophos Email Appliance now includes Sandstorm, an advanced, next-generation sandboxing technology that quickly and accurately detects, blocks and responds to sophisticated, constantly-changing cyber threats.
Sophos Sandstorm is an advanced persistent threat (APT) and zero day malware security technology. To combat elusive threats that target email accounts on multiple platforms and mobile devices, companies need signatureless protection in addition to traditional malware protection.
Threats are now engineered to be “low and slow” to stay under the radar, using polymorphic and stealth techniques to avoid and delay detection. Today’s cyber-criminals are also proactively taking steps to target, research and crack an organisation’s specific security measures by sending bespoke malware attached to seemingly-benign email messages. Sophos Sandstorm uses powerful cloud-based technology to isolate and address these types of threats before they enter a business network. Information technology managers are provided with detailed reports of threat behavior and analysis for further investigation and action, if required.
“Sophos Sandstorm combines prevention, detection and investigation in one solution to protect against cyber-criminals who now use social-engineering tactics with new, not-previously-known malware to invade company networks,” says Bryan Barney, senior vice-president and GM, Sophos Network Security Group. “Keeping threats away from the network is a critical first line of defence. Sophos Sandstorm automatically isolates files to determine if they’re safe, providing an instant additional layer of detection and protection. Advanced technologies are often too expensive and require additional security expertise to implement and monitor them. Sophos is changing this by providing all businesses access to advanced protection that’s affordable and simple to deploy.”
Sophos Sandstorm determines potential threat behavior across multiple operating systems, including: Windows, Mac and Android; physical and virtual hosts; networks; Web mail; Word and PDF documents; more than 20 file types; mobile applications and more.