Razor Continuous Protection Product Suite
CALL FOR SPECIAL GOVERNMENT PRICING
Digital DNA™ uses automated memory analysis to flag malware and suspicious binaries
The Continuous Protection product suite provides host and perimeter-level protection
The Razor Continuous Protection Product Suite captures all executable code within the Windows® operating system and running programs that can be found in physical memory, including targeted attacks, rootkits, injected code and custom malware so you can provide near real-time response.
Other perimeter security and some behavior-based solutions are built on sandboxing and other outdated methodology that can’t detect all unknown threats. Razor captures all executable code within the Windows® operating system and running programs that can be found in physical memory, including targeted attacks, rootkits, injected code and custom malware so you can provide near real-time response.
Built on HBGary’s innovative, proven technology to detect targeted attacks at the host, Razor provides both perimeter- and host-level threat information for the industry’s most comprehensive view and analysis of today’s unknown threats.
Perimeter devices alone can’t protect sensitive data. Today’s targeted threats circumvent existing security technologies and infect the most vulnerable point on your system — the host. Organizations need to have an integrated solution that protects both the perimeter and the host.
Razor leverages HBGary’s core technology, Digital DNA™, the proven, behavior-based method for detecting targeted, non-signature-based malware using physical memory. Digital DNA analyzes programmatic behaviors to assign each binary a threat severity score, along with human-readable behavioral traits so organizations can immediately assess and respond to each risk.
Behavioral Analysis: Razor performs behavioral analysis at the perimeter.
Document Capture: The software captures documents in real-time passively from the network.
File Detonation: The software automatically "detonates" these captured files within a virtual machine and performs extremely low level tracing of all instructions. This data is then used to recover clear-text information and behaviors that reveal whether the document is malicious..
Real-Time Alerts: Makes captured information available at the console for the analyst and generates a real-time alert.
Malicious Identification: Detects known malicious command and control using a combination of DNS intelligence, protocol patterns, netblock reputation, and country of origin data.
Ruleset Protocol: The ruleset is updated as part of the Digital DNA subscription and customers can also specify their own custom rules..
Traffic Blocking: This optional feature automatically blocks all further traffic associated with the malicious site and/or document.
Regular Updates:Regular updates are provided by HB Gary for the Digital DNA™ behavioral rule set.
UNPARALLELED THREAT INTELLIGENCE:
Command and Control Protocols: Command and control protocols, IP addresses, malicious URL’s and DNS are included
Host Level Information: Host level information, MD5 checksums, malicious file paths and registry keys.
Traces:Exploit details and execution traces.
*About Digital DNA™
Without relying on the operating system which itself may be subverted, Digital DNA™ uses automated physical memory analysis to reveal all running software and their underlying behaviors to flag malware and suspicious binaries. Malware threats are automatically detected and displayed on the dashboard console. These malware behavioral traits provide quick threat metadata — critical threat intelligence needed to protect today’s enterprise systems against advanced targeted and unknown attacks.
Digital DNA™ is currently deployed at Fortune 500 corporations and leading government agencies.
Warranty: One Year. Optional one year extended warranty available.
|GSA Purchase Price
|Optional 1 Year Extended Warranty
|GSA 1 Year Extended Warranty
||Up to 50 Mb/s (DS3)