Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

New Juniper Solution Tricks Malware Into Revealing Itself

SAN FRANCISCO – RSA CONFERENCE 2014Juniper Networks has unveiled a new malware detection service for its SRX Series Services Gateways that the company says can identify malware that many traditional solutions which analyze signatures or Command and Control traffic cannot detect.

SAN FRANCISCO – RSA CONFERENCE 2014Juniper Networks has unveiled a new malware detection service for its SRX Series Services Gateways that the company says can identify malware that many traditional solutions which analyze signatures or Command and Control traffic cannot detect.

While most vendors in the threat detection and prevention space have been making similar claims for some time, Juniper’s new service, called “Argon Secure“, takes somewhat of a different approach and attempts to “trick” malware into making its presence known when inside enterprise walls.

Juniper Networks

Leveraging Juniper’s experience using Intrusion Deception Technology to prevent attacks against web applications, Argon Secure applies the technology to both networks and endpoints to detect malware at multiple points in the attack process.

Using the firewall features of the SRX Series platform as an enforcement engine, Argon helps detect malware both at, and after, the point of initial infection when it attempts to propagate, find valuable data and exfiltrate that data from the network, Juniper said.

Juniper says the solution will come bundled with more than 50 deception techniques embedded in the network infrastructure to force malware to expose itself even after entering a network.

“For example, malware once installed will start scanning the internal network in search of files that look useful,” Juniper explained. “This action provides an opportunity to detect an attacker in the enterprise by creating a fake network process that emulates network share drives so when malware touches the files, Argon Secure can instantly identify them and push fake files.”

Juniper’s Intrusion Deception Technology originally came from its $80 million acquisition of Mykonos Software in February 2012. 

Argon Secure will be available in Q3 2014 as a subscription-based service for the SRX Series Services Gateways.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

Cisco patched a high-severity SQL injection vulnerability in Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition (CM SME).

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...