Introducing VectorN Detection against Second Generation Malware

Share and earn Cybytes
Facebook Twitter LinkedIn Email

Starting June 30, 2017, our Heimdal CORP and Heimdal PRO users fully enjoy the benefits of machine learning insights that fuel even stronger protection against advanced and sophisticated malware.

We are delighted to announce the launch of a landmark enhancement to our DarkLayer GUARD engine, called VectorN Detection. This is the result of coordinated, hard work between our team and our strategic partners that share the same values and dedication for online security.

VectorN Detection will focus on ensuring Code Autonomous ProtectionTM on both corporate and private endpoints, detecting malware in ways that no other endpoint protection can.

A few key things you should know about VectorN Detection :

  • It works across-the-board on any Windows™ device;
  • It does not rely on scanning the code or auditing any system processes. Instead, the new technology uses Machine Learning Detection (MLD) to perform an in-depth analysis of all incoming and outgoing HTTP, HTTPS and DNS traffic.
  • It matches Machine Learning (MLD) insights with Indicators of compromise/attack (IOC/IOA) and network forensics, turning Heimdal CORP and Heimdal PRO into unique, proactive cyber security suites.
  • It helps users discovers even hidden, second generation malware that tries to infect the endpoint or attempts to harvest data from the compromised system.
  • By tracking device-to-infrastructure communication, this technology enables users to detect and block advanced malware, regardless of the attack vector.

The graphic below illustrates how VectorN DetectionTM empowers both Heimdal CORP and Heimdal PRO users to detect and block even hidden malware attacks, preventing malware from infiltrating the system.

Heimdal CORP and Heimdal PRO work proactively to detect APTs, ransomware strains, botnets. Trojans and more, while blocking them until removed from the system.

Our main goal at HeimdalTM is to enable users to close vulnerabilities and mitigate exploits, while constantly blocking incoming attacks, data leakage and Command & Control server communication.

What you need to know about Darklayer GUARDTM

HeimdalTM has a unique, client-based two-way Traffic Scanning  Engine which detects and blocks network communication to mitigate Zero Hour exploits, ransomware C&Cs, malware backbones, next-generation attacks and data leakage.

In addition to blocking the source of threat by analyzing traffic-based communication, the Threat to Process Correlation (TTPC) technology will also identify the malicious process, enabling endpoint owners to act fast in containing and cleaning the potential infection. When malware tries to compromise your computer, you’ll know which application or process it’s trying to infect, so you can stop attackers in their tracks.

Our team is constantly working to improve Heimdal™ Security products and develop new features that can strengthen users’ security against cyber threats, no matter what the challenge is.

We recommend keeping a keen eye on our blog for the security alerts and stay up to date with the new attacks that can target your sensitive data.

Stay safe!

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Heimdal Security
We protect users and companies from cyber-criminal actions, by keeping confidential information and intellectual property safe. We build products focused on proactive cyber security and we dedicate a big part of our efforts to cyber security education for everyone.
Promoted Content
Expert Roundup: Is Internet Security a Losing Battle?
A while ago, one of our readers asked us to answer the following questions: Is Internet security a losing battle? How come companies are always 1-2 steps behind the fight? How can the bad guys respond so fast?That reader is certainly not the only one with this issue on his mind. Many Internet users feel discouraged by the current state of cyber crime and its consequences, and the rest don’t yet understand why they should care about it. We wanted to do something to change this.Naturally, users like you and me are not the only ones who wrestle this dilemma. Within the industry, cyber security experts are deeply involved in studying the causes and changes which have brought us to this point so they can create better solutions. Each of these experts brings a different perspective to the discussion, because no single person can ever claim to have the full picture.That is why we reached out to some of the most experienced cyber security specialists in the field to gather their thoughts on the topic. We believe that the questions we received are justified and they deserve an honest answer. And you will find plenty of them in the article!

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?