Perimeter 81 boosts malware protection

>

Perimeter 81 says it’s gotten even better at protecting its customers from Internet threats as it adds malware protection to its growing list of services.

The new offering works as a combination of constantly updated signature-based detection and advanced machine learning-based capabilities that can identify and block complex polymorphic and zero-day attacks, the company said. It added that the feature complements existing web filtering services well, resulting in even stronger and more robust protection for all users, regardless of company size.

The number of cyber threats facing businesses is growing every day. Between viruses, Trojans, keyloggers, phishing attacks, ransomware and other malware, not a day goes by that we don’t learn that a new company falls victim to a dangerous cyber-attack. The results usually include hefty data protection watchdog fines, loss of business, and tarnished reputation.

Easy installation

To protect against these threats, companies deploy all kinds of security solutions, from firewalls to VPNs, to password managers and web filters. However, the decentralized nature of these solutions makes management difficult, allowing attackers to slip through the cracks. So it is always welcome to have fewer solutions that cover more aspects of cyber risk.

Perimeter 81 says that the malware protection feature does not require any specific settings. As soon as users log in to the agent, the new offering is activated, automatically applying an extra level of protection. In addition, the user experience is not affected, the company claims. Malware protection works on the wider internet as well as corporate networks, it added.

“Malware protection is becoming increasingly important for organizations to arm themselves with so they can avoid threats like HavanaCrypt,” said Amit Bareket CEO and Co-Founder of 81. “This advances Perimeter 81’s converged network security offerings to easily make any business network a hardware-free, cloud-based service. ”

When users activate the new product, it starts inspecting web traffic (file downloads, HTML, JavaScript, CSS, etc.), looking for potential malware. Once the traffic is deemed safe, it is sent to the end user’s browser. If it detects a threat, it will block it and notify the user. The reports are also sent to the company’s IT administrators for further analysis.

Related Post