Access "Malware Analysis"
This article is part of the September 2007 issue of How to dig out rootkits
MALWARE ANALYSIS Norman SandBox Analyzer Pro REVIEWED BY TOM LISTON Norman Price: Starts at $5,000 for 100 users Relying solely on antivirus to protect you from malware is no longer an option. Antivirus software is reactive; vendors only release signatures for malware they've seen. With the growing prevalence of more targeted viruses, the bigger your company, the more likely you are to be hit by something that no one, not even an antivirus vendor, has seen before. In response, many companies are developing in-house malware analysis capabilities. Norman SandBox Analyzer Pro is a unique malware analysis tool that allows potentially malicious code to execute within a simulated environment that effectively mimics a generic Windows installation. All actions taken by the code under analysis are monitored. Any permanent changes that the test code attempts to make are trapped by the sandbox (files don't get written to the file system, keys don't get changed in the registry) but everything appears normal from the point of view of the code under test. Analysis ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Database Security: Oracle Database Vault
Oracle Database Vault
-
At Your Service: Atlas Vigilar
Vigilar's Atlas
-
What CISOs need to know about computer forensics
With computer forensics needed for civil litigation, human resources investigations and criminal cases, organizations need to ensure they're prepared and evidence is preserved. This feature details steps involved in computer forensics, common missteps, and forensics resources.
-
Consolidation's impact on best-of-breed security
Standalone security vendors are attractive targets for large infrastructure players such as EMC. This feature looks at the consolidation in the security market and the potential for best-of-breed security to eventually disolve into a mashup of suites and services by big vendors like EMC, IBM, Microsoft, and HP.
-
Intrusion Prevention: Stonesoft's SGI-2000S IPS
SGI-2000S IPS
-
HIPS
CA Host-Based Intrusion Prevention System
-
Database Security: Oracle Database Vault
-
-
Malware Analysis
Norman SandBox Analyzer Pro
-
Rootkit detection and removal know-how
Get advice on how to detect malware and rootkits and the best ways to achieve rootkit removal and prevent hacker attacks.
-
Logical, physical security integration challenges
Integrating physical and IT security can reap considerable benefits for an organization, including enhanced efficiency and compliance plus improved security. But convergence isn't easy. Challenges include bringing the physical and IT security teams together, combining heterogenous systems, and upgrading a patchwork of physical access systems.
-
SIM and NBA product combination is powerful
The recent announcement that Mazu Networks, a provider of network-based analysis (NBA) tools, and eIQnetworks, a supplier of SIM products, underscores the trend towards convergence in the NBA and SIM markets. The value proposition is clear: two useful network/security data analysis tools in one integrated package.
-
Virtualization
BufferZone Enterprise
-
Malware Analysis
-
Columns
-
Bruce Schneier, Marcus Ranum debate home users and security
by Marcus J. Ranum, Contributor
Bruce Schneier and Marcus Ranum debate how to deal with the security problems posed by home computer users. Both dismiss user education, but Schneier believes ISPs should be forced to become IT departments while Ranum argues that building simpler systems is not the answer.
-
Ping: Nate Lawson
Nate Lawson
-
Perspectives: The Lesson of Estonia
Prof. Dorothy Denning writes the cyberattacks on Estonia and how they took activism to a new level.
-
Time to take cyberterrorism talk seriously
With the power of botnets, SCADA systems becoming less proprietary and the recent attacks on Estonia, have we reached an inflection point where we need to take the likelihood of cyberterrorism?
- Viewpoint: Correlate SIMs and log management
-
Bruce Schneier, Marcus Ranum debate home users and security
by Marcus J. Ranum, Contributor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO