회사소개

제품

안내

고객지원

Company

Product

Information

Support

Thông tin về công ty

Sản phẩm

Thông tin

Hỗ trợ chung

ZombieZERO File Inspector

APT response solution for the transmitted file to the internal network in the network separation environment

ZombieZERO File Inspector

ZombieZERO File Inspector Indroduction

ZombieZERO File Inspector protects content from attacks occurring in a variety of file types.
Webmail, online file transfer tools, cloud and portable file storage devices can be attacked by malwares that spread to shared files and content storage.
Analyzes shared file via network and enterprise content management storage to detect and isolate malware (bypassing firewalls, IPS, AV and gateways) infected by employees or outsiders.

Main Features

  • Automatically isolates files proven to be malicious to prevent them from entering the internal network.
  • Possible to analyze files up to 1GB capacity, and retransmit the false positive files.
  • Easy to add virtual system and expand system by analyzer addition. Redundant system is possible. (Active-Active, Active-Stanby)
  • Provides various alerts and connection. (HTTP, SMS, E-MAIL, SNMP, SYSLOG)
  • Interworks with network connection system (Window, Linux). Files can be processed via shared folders.
  • Continuously scans files to warn and permanently isolate malware found in storage.
    Securely integrates with storage services using the WebDAV protocol to protect enterprise business workflows.
  • Also protects the network of the PC where the EDR products are installed by sharing malware info with ZombieZERO Manager installed together.

>  Malware problems when sharing files

  • Today’s sophisticated cyber attacks use complex malware and APT tactics to infiltrate and spread around via file sharing and storage.
    So malware can establish a long-term basis in the network and infect multiple systems including offline.
  • Many enterprises’ data centers are especially vulnerable to file-based, advanced malware.
    Because these attacks infiltrating the network through legitimate means cannot be defended by traditional defense technologies.
    Cybercriminals exploit these vulnerabilities to spread malware in the shared files via network and inject malware into massive storage and continue to threaten after treatment.

>  Vital content protection to prevent advanced attacks

  • If there is no way to detect resting malware in a file, APT can attack network assets and extract sensitive information and cause serious damage.
  • Uses a virtual system that detects Zero-Day malware contained in common file types (PDF, MS Office, vCards, ZIP / RAR / TNEF, etc.) and multimedia content (QuickTime, MP3, Real Player, JPG, PNG etc.) to analyze shared files and storage.
  • Identifies and isolates hidden malware by investigating files and storage shared via network. This stops the key step of the advanced attack process.

ZombieZERO File Inspector system block diagram

npcore