The solution addresses the gap between threat detection and incident containment

Nov 19, 2013 09:26 GMT  ·  By

Blue Coat has launched a new Content Analysis System that uses malware analysis to automate advanced threat protection. Organizations can rely on this solution to address the gap between incident containment and threat detection.

The Content Analysis System is designed to detect, analyze, and block advanced threats. The new threat intelligence collected from each organizations is shared through the Blue Coat Global Intelligence Network in order to allow Blue Coat’s 15,000 customers to benefit from it.

The new system is powered by IntelliVM and SandBox technologies from Norman Shark.

“Existing sandboxing technologies cannot effectively replicate real-world environments, leaving organizations with little information that will help them contain or resolve an incident,” noted Stein Surlien, CEO at Norman Shark.

“The Norman Shark IntelliVM and SandBox technologies solve this problem by delivering customizable environments for more comprehensive and detailed detection of unknown malware.”

The Content Analysis System provides companies with dynamic malware analysis and application whitelisting. The solution supports a maximum of two antivirus signature databases.

Organizations that use the analysis system benefit from advanced sandboxing technology that allows them to detect unknown or advanced malware. In addition, the Content Analysis System acts as a broker for multiple malware analysis and sandboxing instances. This means that customers can optimize their existing investments.

“To protect their networks from advanced targeted attacks and zero-day malware, businesses need a systematic approach that aligns security teams on the right strategy, process and action to block the threats they can, detect the ones they can’t and respond to the ones that are already on the network,” said Greg Clark, CEO at Blue Coat Systems.

“Our Content Analysis System is a key technology for organizations that want to build an automated defense into their networks that continually fortifies the network by operationalizing new threat intelligence. This allows our customers to protect and empower their business.”