SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
ELIMINATE MOBILE CODE THREATS
                                                                With




Firewalls, PKI, Intrusion Detection and Anti-Virus Software Are
No Longer Enough
Mobile code, such as Java applets, JavaScripts, ActiveX controls and VBScripts are increasingly
becoming an essential part of e-business. Mobile code enables interactive and feature rich web sites
and e-mail content and is normally transparent to the user.

However, there’s a dark side to mobile code. Because it
can have broad permissions, mobile code can execute
malicious activities such as:
 • Accessing confidential information
 • Acting as a transport mechanism for viruses
 • Running programs from client machines

In today’s always-on environment, malicious mobile code
is deemed to be the biggest threat to computer security
systems. Nimda infected 70% of Fortune 1000 companies
(all of whom had firewall and anti-virus software deployed). It caused one major brokerage firm to
shut down their entire network for 11 days.

               "Finjan identified the problem early on with comprehensive                                         “Finjan is the market
               products that are proving sound and easy to implement. To                                            leader in proactive
               me, it's the clear leader. If I'm worried about security of mobile                      malicious mobile code security.”
code, Finjan would be the company I'd talk to." - GIGA Information Group


Key Features
Total Protection from Malicious Mobile Code:
Finjan’s Vital Security Solution protects against malicious mobile code attacks from:
 • ActiveX controls
 • Java applets
 • JavaScript – both embedded and stand-alone
 • VBScript – both embedded and stand-alone

Vital Security also provides these additional security technologies to catch every possible policy
violation from any type of attack:
 • Anti-Virus
 • URL Category Filters
 • URL Filters
 • Active Content Filters (e.g., documents, executables, plug-ins)
 • Certificate Filters
 • E-Mail sender Filters
 • Spam
                                                                              "Finjan currently offers the strongest enterprise defense
                                                                              against mobile code, with the most flexible performance
                                                                              and scalability characteristics." – Patricia Seybold,
                                                                              Seybold Group
Easy to Use Policy Management and Reporting to Simplify Security Administration
 • Policy Wizard to make adding, changing and deleting policies extremely simple
 • Granular policy engine with white and black lists to allow exceptions for safe sites
 • Over 125 standard reports out of the box
 • W3C formatted log files
 • X-Ray analysis to peek into your network without impacting your users
 • Automatically update policies from log entries
Security Expertise to Help You Every Step of the Way
 • Malicious Code Research Center – our one-stop resource for information on malicious mobile code
   and alert notifications. Customers can send blocked active content details to Finjan’s Malicious Code
   Research Center for analysis and advice by our expert security engineers.

How MMC Scanning and Filtering Works
Protecting All of Your Computer Assets
At the corporate network gateway Finjan’s Vital Security behavior analysis does contextual analysis of
the entire mobile code packet rather than just scanning for key words or phrases. This produces far fewer
false positives and eliminates loopholes for hackers to exploit.
Vital Security for Web detects active content and protects
incoming HTTP/FTP/HTML/HTTPS (SSL) traffic by scanning
active content objects. Vital Security for E-Mail protects for
SMTP and POP3 traffic. Both include the following:
  • Proactive content inspection and blocking of hostile active
     content objects, including executables, plug-ins, MS Office
    documents, embedded and stand-alone scripts
  • Learning from previous code analysis to streamline
     processing time
  • URL filtering by origin (source) and by digital certificates
At the user’s desktop, Vital Security for Clients detects active content as it begins to run, monitors it
during runtime and enforces your security policies, including:
  • Detection of start/stop events of active content objects in the system
  • Runtime monitoring of active content object activities at the operating system level
  • Runtime monitoring of Java Applets at the Java Virtual Machine level
  • Ability to control (kill) running active content objects
  • User only sees safe content; all potentially harmful content is blocked and eliminated before it
    gets to the screen

Policies and Profiles
Using Finjan’s policy management console, Vital Security Console, system administrators can configure
and control a corporate-wide security policy for all Internet traffic in the network, including ActiveX,
Java, executables, JavaScript, VB Script and embedded plug-ins.
All Finjan Vital Security Solutions support security auditing through detailed log-based activity reports,
which can be produced and viewed using the logging and reporting feature built into Vital Security
Console.
Vital Security allows the administrator to set a block/allow/scan policy for every active content type.
For each type of code, an "Allow" policy passes it through without modification. A "Block" policy will
block the active content object from being sent to the user. A "Scan" policy will pass the code through
the appropriate code scanner, create a unique identifier for the code object, and compare the code profile
to the policy.
The security profile contains all potentially sensitive resources and hostile operations that the active
content object can act on or perform on the client’s desktop. Similarly, a security policy represents the
parallel set of permissions to access restricted resources:
 • File system operations: Read, Read/Write
 • Network access operations: Listen, Connect, Send, and Receive
 • Registry operations: Read, Write
 • Operating System operations, such as creating, terminating, or changing the priority of processes and
   threads; accessing other applications that are running; loading dynamic link libraries, etc.
 • JVM and Browser operations that involve access to internal objects inside the browser or the Java
   Virtual Machine, such as using the browser services to send e-mail, read/write cookies, change the settings
   of the Java Virtual Machine Security Manager, etc.

The Best Solution
Finjan’s key benefit lies in its ability to proactively scan code coming from the Internet using our patented
contextual behavior analysis technology, profile the code to determine which resource access operations
it may attempt to perform and block code that attempts to perform operations that are not allowed
according to the predefined policy. This is the heart of Finjan’s ability to block new attacks without any
prior knowledge of them and close the Window of Vulnerability of traditional signature-based anti-virus
software.
The Finjan Vital Security Solution is the industry’s only integrated best-of-breed content security solution
with contextual behavior analysis for malicious mobile code defense, traditional virus protection, integrated
web content filtering, Internet access management, central management and reporting, spam control and
our unique watermarking and document auditing technology.

About Finjan
Finjan Software’s Vital Security™ is the only complete and integrated Secure Content Management solution
in which individual best-of-breed security applications work together in concert to proactively respond
to changing security threats today and tomorrow. Supplementing traditional security methods, Vital Security
defends enterprises against Malicious Mobile Code using intelligent behavior analysis and comprehensive
policy management. Vital Security is designed with high availability and scalability, for enterprises of all
sizes, including those with over 100,000 users. Finjan is recognized by analyst firm IDC as the leader in
the worldwide Malicious Mobile Code security market. For more information, visit http://www.finjan.com.




                 © 2004 by Finjan Software, Inc., and/or its subsidiaries
                 WWW.FINJAN.COM
                 Printed in the U.S.A.
                 USA MMCFS2.0 03.04 EN
                 Finjan, Finjan logo, and Vital Security are trademarks or registered trademarks of Finjan Software, Inc., and/or its subsidiaries.
                 All other registered and unregistered trademarks are the sole property of their respective owners. The Finjan Software products
                 described in this document are protected by one or more of the following U.S. Patents: 6092194, 6167520, 6480962, 6209103,
                 6298446, and 6353892 and may be protected by other U.S. Patents, foreign patents, or pending applications.
www.finjan.com

Weitere ähnliche Inhalte

Was ist angesagt?

4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint SettingsSophos
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTForescout Technologies Inc
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsLacoon Mobile Security
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Web application firewall
Web application firewallWeb application firewall
Web application firewallAju Thomas
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
FIDO Based Consumer Authentication
FIDO Based Consumer AuthenticationFIDO Based Consumer Authentication
FIDO Based Consumer AuthenticationFIDO Alliance
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsIncheon Park
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iPrecisely
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? Forescout Technologies Inc
 
Tamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against HackingTamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against HackingFlexera
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?Ahmed Banafa
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 

Was ist angesagt? (20)

4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Web application firewall
Web application firewallWeb application firewall
Web application firewall
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
FIDO Based Consumer Authentication
FIDO Based Consumer AuthenticationFIDO Based Consumer Authentication
FIDO Based Consumer Authentication
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
IoT security
IoT securityIoT security
IoT security
 
Tamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against HackingTamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against Hacking
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 

Ähnlich wie Malicious Mobile Code Fact Sheet from Finjan

IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Brochure-FortiGuard-Security-Services
Brochure-FortiGuard-Security-ServicesBrochure-FortiGuard-Security-Services
Brochure-FortiGuard-Security-ServicesDavid Maciejak
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxSameerShaik43
 
10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your Website10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your WebsiteCigniti Technologies Ltd
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionShane Rice
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37Felipe Prado
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsAnthony Daniel
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliJürgen Ambrosi
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat ManagementKillian Delaney
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityBob Guimarin
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
MOP Product Presentation
MOP Product PresentationMOP Product Presentation
MOP Product Presentationtswong
 

Ähnlich wie Malicious Mobile Code Fact Sheet from Finjan (20)

Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Brochure-FortiGuard-Security-Services
Brochure-FortiGuard-Security-ServicesBrochure-FortiGuard-Security-Services
Brochure-FortiGuard-Security-Services
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docx
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 
10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your Website10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your Website
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
MOP Product Presentation
MOP Product PresentationMOP Product Presentation
MOP Product Presentation
 

Mehr von Elliott Lowe

Contact Database Gap Analysis
Contact Database Gap AnalysisContact Database Gap Analysis
Contact Database Gap AnalysisElliott Lowe
 
VMware Partner Program P&L Analysis
VMware Partner Program P&L AnalysisVMware Partner Program P&L Analysis
VMware Partner Program P&L AnalysisElliott Lowe
 
VMware Partner Program Plan
VMware Partner Program PlanVMware Partner Program Plan
VMware Partner Program PlanElliott Lowe
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanElliott Lowe
 
Finjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White PaperFinjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White PaperElliott Lowe
 
Contact Management Plan
Contact Management PlanContact Management Plan
Contact Management PlanElliott Lowe
 
Contact Discovery Vendor Process
Contact Discovery Vendor ProcessContact Discovery Vendor Process
Contact Discovery Vendor ProcessElliott Lowe
 
Contact Discovery Requirements For Jigsaw
Contact Discovery Requirements For JigsawContact Discovery Requirements For Jigsaw
Contact Discovery Requirements For JigsawElliott Lowe
 
Using The Contact Gap Analysis Report
Using The Contact Gap Analysis ReportUsing The Contact Gap Analysis Report
Using The Contact Gap Analysis ReportElliott Lowe
 
Account Based Marketing Project Proposal
Account Based Marketing Project ProposalAccount Based Marketing Project Proposal
Account Based Marketing Project ProposalElliott Lowe
 
Event Marketing Best Practices
Event Marketing Best PracticesEvent Marketing Best Practices
Event Marketing Best PracticesElliott Lowe
 
Contact Management Project Proposal
Contact Management Project ProposalContact Management Project Proposal
Contact Management Project ProposalElliott Lowe
 
Webcast Marketing Best Practices
Webcast Marketing Best PracticesWebcast Marketing Best Practices
Webcast Marketing Best PracticesElliott Lowe
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best PracticesElliott Lowe
 
RSA Conference 2008 Marketing Plan
RSA Conference 2008 Marketing PlanRSA Conference 2008 Marketing Plan
RSA Conference 2008 Marketing PlanElliott Lowe
 

Mehr von Elliott Lowe (15)

Contact Database Gap Analysis
Contact Database Gap AnalysisContact Database Gap Analysis
Contact Database Gap Analysis
 
VMware Partner Program P&L Analysis
VMware Partner Program P&L AnalysisVMware Partner Program P&L Analysis
VMware Partner Program P&L Analysis
 
VMware Partner Program Plan
VMware Partner Program PlanVMware Partner Program Plan
VMware Partner Program Plan
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from Finjan
 
Finjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White PaperFinjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White Paper
 
Contact Management Plan
Contact Management PlanContact Management Plan
Contact Management Plan
 
Contact Discovery Vendor Process
Contact Discovery Vendor ProcessContact Discovery Vendor Process
Contact Discovery Vendor Process
 
Contact Discovery Requirements For Jigsaw
Contact Discovery Requirements For JigsawContact Discovery Requirements For Jigsaw
Contact Discovery Requirements For Jigsaw
 
Using The Contact Gap Analysis Report
Using The Contact Gap Analysis ReportUsing The Contact Gap Analysis Report
Using The Contact Gap Analysis Report
 
Account Based Marketing Project Proposal
Account Based Marketing Project ProposalAccount Based Marketing Project Proposal
Account Based Marketing Project Proposal
 
Event Marketing Best Practices
Event Marketing Best PracticesEvent Marketing Best Practices
Event Marketing Best Practices
 
Contact Management Project Proposal
Contact Management Project ProposalContact Management Project Proposal
Contact Management Project Proposal
 
Webcast Marketing Best Practices
Webcast Marketing Best PracticesWebcast Marketing Best Practices
Webcast Marketing Best Practices
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best Practices
 
RSA Conference 2008 Marketing Plan
RSA Conference 2008 Marketing PlanRSA Conference 2008 Marketing Plan
RSA Conference 2008 Marketing Plan
 

Kürzlich hochgeladen

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 

Kürzlich hochgeladen (20)

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 

Malicious Mobile Code Fact Sheet from Finjan

  • 1. ELIMINATE MOBILE CODE THREATS With Firewalls, PKI, Intrusion Detection and Anti-Virus Software Are No Longer Enough Mobile code, such as Java applets, JavaScripts, ActiveX controls and VBScripts are increasingly becoming an essential part of e-business. Mobile code enables interactive and feature rich web sites and e-mail content and is normally transparent to the user. However, there’s a dark side to mobile code. Because it can have broad permissions, mobile code can execute malicious activities such as: • Accessing confidential information • Acting as a transport mechanism for viruses • Running programs from client machines In today’s always-on environment, malicious mobile code is deemed to be the biggest threat to computer security systems. Nimda infected 70% of Fortune 1000 companies (all of whom had firewall and anti-virus software deployed). It caused one major brokerage firm to shut down their entire network for 11 days. "Finjan identified the problem early on with comprehensive “Finjan is the market products that are proving sound and easy to implement. To leader in proactive me, it's the clear leader. If I'm worried about security of mobile malicious mobile code security.” code, Finjan would be the company I'd talk to." - GIGA Information Group Key Features Total Protection from Malicious Mobile Code: Finjan’s Vital Security Solution protects against malicious mobile code attacks from: • ActiveX controls • Java applets • JavaScript – both embedded and stand-alone • VBScript – both embedded and stand-alone Vital Security also provides these additional security technologies to catch every possible policy violation from any type of attack: • Anti-Virus • URL Category Filters • URL Filters • Active Content Filters (e.g., documents, executables, plug-ins) • Certificate Filters • E-Mail sender Filters • Spam "Finjan currently offers the strongest enterprise defense against mobile code, with the most flexible performance and scalability characteristics." – Patricia Seybold, Seybold Group
  • 2. Easy to Use Policy Management and Reporting to Simplify Security Administration • Policy Wizard to make adding, changing and deleting policies extremely simple • Granular policy engine with white and black lists to allow exceptions for safe sites • Over 125 standard reports out of the box • W3C formatted log files • X-Ray analysis to peek into your network without impacting your users • Automatically update policies from log entries Security Expertise to Help You Every Step of the Way • Malicious Code Research Center – our one-stop resource for information on malicious mobile code and alert notifications. Customers can send blocked active content details to Finjan’s Malicious Code Research Center for analysis and advice by our expert security engineers. How MMC Scanning and Filtering Works Protecting All of Your Computer Assets At the corporate network gateway Finjan’s Vital Security behavior analysis does contextual analysis of the entire mobile code packet rather than just scanning for key words or phrases. This produces far fewer false positives and eliminates loopholes for hackers to exploit. Vital Security for Web detects active content and protects incoming HTTP/FTP/HTML/HTTPS (SSL) traffic by scanning active content objects. Vital Security for E-Mail protects for SMTP and POP3 traffic. Both include the following: • Proactive content inspection and blocking of hostile active content objects, including executables, plug-ins, MS Office documents, embedded and stand-alone scripts • Learning from previous code analysis to streamline processing time • URL filtering by origin (source) and by digital certificates At the user’s desktop, Vital Security for Clients detects active content as it begins to run, monitors it during runtime and enforces your security policies, including: • Detection of start/stop events of active content objects in the system • Runtime monitoring of active content object activities at the operating system level • Runtime monitoring of Java Applets at the Java Virtual Machine level • Ability to control (kill) running active content objects • User only sees safe content; all potentially harmful content is blocked and eliminated before it gets to the screen Policies and Profiles Using Finjan’s policy management console, Vital Security Console, system administrators can configure and control a corporate-wide security policy for all Internet traffic in the network, including ActiveX, Java, executables, JavaScript, VB Script and embedded plug-ins. All Finjan Vital Security Solutions support security auditing through detailed log-based activity reports, which can be produced and viewed using the logging and reporting feature built into Vital Security Console. Vital Security allows the administrator to set a block/allow/scan policy for every active content type. For each type of code, an "Allow" policy passes it through without modification. A "Block" policy will block the active content object from being sent to the user. A "Scan" policy will pass the code through the appropriate code scanner, create a unique identifier for the code object, and compare the code profile to the policy.
  • 3. The security profile contains all potentially sensitive resources and hostile operations that the active content object can act on or perform on the client’s desktop. Similarly, a security policy represents the parallel set of permissions to access restricted resources: • File system operations: Read, Read/Write • Network access operations: Listen, Connect, Send, and Receive • Registry operations: Read, Write • Operating System operations, such as creating, terminating, or changing the priority of processes and threads; accessing other applications that are running; loading dynamic link libraries, etc. • JVM and Browser operations that involve access to internal objects inside the browser or the Java Virtual Machine, such as using the browser services to send e-mail, read/write cookies, change the settings of the Java Virtual Machine Security Manager, etc. The Best Solution Finjan’s key benefit lies in its ability to proactively scan code coming from the Internet using our patented contextual behavior analysis technology, profile the code to determine which resource access operations it may attempt to perform and block code that attempts to perform operations that are not allowed according to the predefined policy. This is the heart of Finjan’s ability to block new attacks without any prior knowledge of them and close the Window of Vulnerability of traditional signature-based anti-virus software. The Finjan Vital Security Solution is the industry’s only integrated best-of-breed content security solution with contextual behavior analysis for malicious mobile code defense, traditional virus protection, integrated web content filtering, Internet access management, central management and reporting, spam control and our unique watermarking and document auditing technology. About Finjan Finjan Software’s Vital Security™ is the only complete and integrated Secure Content Management solution in which individual best-of-breed security applications work together in concert to proactively respond to changing security threats today and tomorrow. Supplementing traditional security methods, Vital Security defends enterprises against Malicious Mobile Code using intelligent behavior analysis and comprehensive policy management. Vital Security is designed with high availability and scalability, for enterprises of all sizes, including those with over 100,000 users. Finjan is recognized by analyst firm IDC as the leader in the worldwide Malicious Mobile Code security market. For more information, visit http://www.finjan.com. © 2004 by Finjan Software, Inc., and/or its subsidiaries WWW.FINJAN.COM Printed in the U.S.A. USA MMCFS2.0 03.04 EN Finjan, Finjan logo, and Vital Security are trademarks or registered trademarks of Finjan Software, Inc., and/or its subsidiaries. All other registered and unregistered trademarks are the sole property of their respective owners. The Finjan Software products described in this document are protected by one or more of the following U.S. Patents: 6092194, 6167520, 6480962, 6209103, 6298446, and 6353892 and may be protected by other U.S. Patents, foreign patents, or pending applications. www.finjan.com