Anti-Malware

Anti-Malware

 

MULTI-LAYERED

 

ANTI-MALWARE

 

The Network Box Anti-Malware system provides 16 anti-malware engines, running over 12 million signatures, to identify and prevent viruses, trojans, worms and other malicious software, from infecting your networked systems or networked smart devices.

 

Additionally, the anti-malware system transparently scans and analyzes incoming and outgoing SMTP emails, HTTP and FTP protocols for malware. Even attachments such as .exe.zip files, and other compression and encoding formats are decoded and scanned. Furthermore, external emails from POP3 and IMAP accounts are also scanned to ensure your network is secured.

 

The malware signature database that powers the anti-malware system is updated in real-time, using Network Box's patented PUSH Technology.

 

 

 

Anti-Malware

Engines

 

Crypto Hash Checks

Compares each object in the message with a database of malicious object signatures.

 

Regular Expression Checks

Uses regular expressions to look for common malicious code structures.

 

Illegal MIME

Looks for illegal structures and formatting in MIME email messages.

 

Kaspersky Message Scanner

Used to run the Kaspersky AVP anti-virus scanner against the entire message.

 

Kaspersky Object Scanner

Used to run the Kaspersky AVP anti-virus scanner against unpacked objects found inside the email message.

 

Clam Object Scanner

Used to optionally run the Clam anti-virus scanner against unpacked objects found inside the email message.

 

Bagle Variant Heuristics

Used to block new, emerging, variants of the Bagle family of viruses.

 

 

Hidden Executable Heuristics

Used to determine if executable code is hiding in non-executable file extensions.

 

Class ID Heuristics

Checks CLASSID extensions in attached files, as this is a common technique used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

 

Blank Extension Heuristics

Checks file extensions, looking for certain types of blank extension commonly used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

 

Multiple Extension Heuristics

Checks for certain classes of multiple extensions, commonly used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

 

Z-Scan

An in-the-cloud defense shield that provides fast and effective protection against emerging zero-day malware.

 

 

Malware engines info

 

 

Key Features

Engines and Singnatures

16 Engines

12,000,000+ Malware Signatures*

100% Triple Tolly rating

Triple 100% Tolly Group detection rating against their Extended Wildlist Malware database over HTTP, SMTP and POP3 protocols.

Mobile malware protection

Anti-mobile malware protection.

 

 

*For more information and real-time statistics:

Go to Security Response site