balasys-triangle-leftbalasys-triangle-left

Type your search criteria

see-behind
explore zorp
the number one multi-purpose proxy gateway
use case

zorp malware detection

Massive protection against malicious emails
Zorp Malware Detection (ZMD) is a multi-layer malware analysis tool for detecting emails and shared files infected with malicious payloads. Beyond detecting traditional viruses in email attachments, ZMD can also provide protection against targeted APT (Advanced Persistent Threat) attacks by setting an unparalleled level of defense against potentially damaging emails. The multi-layer detection system enables the integration of multiple antivirus engines for filtering known malicious codes as well as dynamic, behavior-based analytics to identify unknown (zero-day) attacks.
Request price
use case

features

contact sales
granular protocol control
Full interpretation and validaton of 20+ network protocols
Connection handling on application layer
Control of protocol channels ( e.g. file transfer, port forward)
comprehensive encryption support
control of SSL / TLS-encrypted protocols
TLS 1.3 cryptography support
SSL and IPSec VPN
use case

use cases

contact sales
separation of critical system
Zorp Gateway is not just a general-purpose enterprise firewall, it can also be deployed on your internal network to isolate and protect your sensitive network zones. more...

For example, you can protect your business-critical SAP system or data center by providing an in-depth, second line of defense behind the firewall on your network perimeter. less...

separation of critical system
Zorp Gateway is not just a general-purpose enterprise firewall, it can also be deployed on your internal network to isolate and protect your sensitive network zones. more...

For example, you can protect your business-critical SAP system or data center by providing an in-depth, second line of defense behind the firewall on your network perimeter. less...

separation of critical system
Zorp Gateway is not just a general-purpose enterprise firewall, it can also be deployed on your internal network to isolate and protect your sensitive network zones. more...

For example, you can protect your business-critical SAP system or data center by providing an in-depth, second line of defense behind the firewall on your network perimeter. less...

separation of critical system
Zorp Gateway is not just a general-purpose enterprise firewall, it can also be deployed on your internal network to isolate and protect your sensitive network zones. more...

For example, you can protect your business-critical SAP system or data center by providing an in-depth, second line of defense behind the firewall on your network perimeter. less...

separation of critical system
Zorp Gateway is not just a general-purpose enterprise firewall, it can also be deployed on your internal network to isolate and protect your sensitive network zones. more...

For example, you can protect your business-critical SAP system or data center by providing an in-depth, second line of defense behind the firewall on your network perimeter. less...

separation of critical system
Zorp Gateway is not just a general-purpose enterprise firewall, it can also be deployed on your internal network to isolate and protect your sensitive network zones. more...

For example, you can protect your business-critical SAP system or data center by providing an in-depth, second line of defense behind the firewall on your network perimeter. less...

separation of critical system
Zorp Gateway is not just a general-purpose enterprise firewall, it can also be deployed on your internal network to isolate and protect your sensitive network zones. more...

For example, you can protect your business-critical SAP system or data center by providing an in-depth, second line of defense behind the firewall on your network perimeter. less...

separation of critical system
Zorp Gateway is not just a general-purpose enterprise firewall, it can also be deployed on your internal network to isolate and protect your sensitive network zones. more...

For example, you can protect your business-critical SAP system or data center by providing an in-depth, second line of defense behind the firewall on your network perimeter. less...

use case

features

download datasheet
Static analysis
Pattern-based scanning with 20+ virus databases
Privacy protection - analysis performed exclusively within the ZMD
Speeds up detecting “known bad” content
Customizable sandbox environment
In-depth analysis in virtual or physical environment
Attachments opened in “real” OS environment
Completely mirrored production environment
Continuously recorded software events (processes, threads, file and registry operations, etc.)  
Dynamic analysis
Inspecting footprints recorded by the opening of attachments
Running comprehensive checks on process, threads, mutex data, file operations and memory dumps
Using several tools and techniques to detect malicious activity
Behavior-based footprint analysis
Comprehensive checks of file behavior
Automatic extendibility for new malware families
Detailed report on analysis results

Benefits

Complex, multi-layer email analysis

Email attachments go through multiple inspection layers which analyze the file content and behavior from different perspectives. Static analysis comes first, supported by more than 20 external virus engines, and other malicious code databases in parallel, providing an outstanding hit rate on its own. If no infection found, the file is forwarded for dynamic analysis for more in-depth inspections. In this phase, ZMD conducts contextual analyzes with multiple tools focusing on the digital footprint of the attachment and its potential impact on the (simulated) environment.

Shared folder analysis

Zorp Malware Detection (ZMD) can continuously monitor shared folders in Windows, detect incoming files, run analysis on them and upload the inspected files to a separate folder. ZMD also attaches a report about the analysis result. Infected files are moved to a quarantine folder.

Real-time prevention of APT attacks

Zorp Malware Detection's strongest weapon against attackers is a virtual sandbox technology that can simulate your runtime environment to examine the behavior of email attachments. At present, this technology provides you with the highest level of protection against malware that exploits the vulnerabilities of MS Office and Adobe.

Customizable sandbox and inspection

Based on your needs, we can help you build a virtual or a physical sandbox environment. APT attacks often target a specific user, so we can even build custom analytic client which perfectly mirrors your user’s runtime environment, including their OS, MS Office, service packs, PDF reader and Java versions. Based on the results of the analysis, your user can initiate further analysis on the incoming emails. They can even request analysis on a physical sandbox machine and ask for the generation of a detailed footprint of the email in question.

High performance

Zorp Malware Detection can analyze approximately 20,000 email attachments on a daily basis. The solution scales horizontally – in an enterprise environment, you can combine any number of ZMD nodes managed by an external load balancer. For dynamic analysis, the analysis time is 2-9 minutes per attachment.

use case

iot security

IoT elements are exposed to be attacked permanently, so they need
solid security tools which can cut risks back to as little as possible.
In a world where everything joins networks, even networks too, you
need a tool to make these increased connections organized.
Button Text