Sophos Sandstorm is available
Sophos
You have certainly followed the reports on the Locky Trojan in the media and wondered whether something like this could happen to you.
Unfortunately, no one was aware of the Locky Trojan until now, which meant that there were no virus and Trojan definitions in the firewalls and antivirus programmes.
This type of attack is also known as a zero day attack.
Simple and powerful next-generation threat prevention
Sophos is at the forefront of the IT security industry in combating malware with highly effective technologies such as real-time JavaScript emulation and behavioural analysis. Traditional malware protection is still important as a first line of defence. However, businesses need additional tools to reliably defend against targeted malware.
Sophos Sandstorm is the solution to defend against advanced persistent threats (APT) and zero-day malware. malware and can be used as a complementary feature with Sophos security products. Using powerful cloud-based next-generation sandbox technology, Sophos Sandstorm enables fast and reliable detection, blocking and response to evasive malware that other solutions miss.
Advanced protection against targeted attacks
Keep unknown data-stealing malware out of your network. With our powerful cloud-based next-generation sandbox technology, you can quickly and reliably detect, block and respond to APTs and zero-day threats. Easy deployment Sophos Sandstorm is fully integrated with your Sophos security solution. All you need to do is update your subscription, apply the Sandstorm policy and you're protected against targeted attacks. The whole process takes just a few minutes.
Blocks evasive malware that others miss
With Sophos Sandstorm, you can also detect unknown threats specifically designed to evade first-generation sandbox appliances. With our cross-system emulation approach, you get detailed insight into the behaviour of unknown malware and detection of malware attacks that others simply miss.
Forensics reports
Respond faster to sophisticated threats with simple, event-driven breach analysis. We provide you with prioritised APT data based on correlation of evidence. This approach not only reduces disruption, but also saves you time.
Comprehensive analysis
Uncover potentially malicious behaviours across all your end-user devices and critical infrastructure. This includes your operating systems (Windows, Mac OS X and Android), physical and virtual hosts, services, network infrastructures, and web, email, file and mobile applications. Threats can run securely in the Sandstorm cloud, eliminating the threat of dangerous malware to your data centres.
Lightning-fast performance
Your Sophos security solution accurately pre-filters your traffic so that only suspicious files are sent to Sandstorm. This way, we ensure that latency and end-user disruption is as low as possible.