Palo Alto Networks has upgraded its security platform with enhancements to its WildFire service that are designed to help organizations detect and fight off malware and exploits.
According to the company, Wildfire has been bolstered an improved level of file visibility, including all common file types such as PDFs, Office documents and encrypted applications. In addition, zero-day exploit detection capabilities have been added that rely on behavioral analysis, and the product works to block command-and-control activity using a global database of compromised domains and infrastructure.
WildFire detects unknown malware, zero-day exploits, and Advanced Persistent Threats (APTs) by executing them in a cloud-based virtual sandbox environment.
The enhancements are accessible via Palo Alto Networks PAN-OS version 6.0. The PAN-OS operating system is the “heart of the Palo Alto Networks platform, which will be available for all Palo Alto Networks customers with valid support contracts,” according to the company.
Previously in order to use WildFire, organizations needed to be an existing Palo Alto Networks firewall customer. However, that is no longer the case, as WildFire is now sold in a stand-alone capacity, the company told SecurityWeek.
“The Palo Alto Networks security platform with WildFire gives us an extra layer of security we didn’t have before — extra inspection and comfort that we can stay ahead of breaches by not just detecting them, but also by easily blocking them,” said Phil Cummings, security administrator, Health Information Technology Services-Nova Scotia. “By having our firewall, URL filtering, threat prevention natively integrated and managed from a single dashboard — instead of multiple niche products, we have a clearer picture of our threat landscape. Ultimately, the platform gives us what we need to effectively detect, analyze, block, and, more importantly, quickly remediate issues.”
The single dashboard is another of the enhancements, and is meant to offer security administrators a view into the information on malware, malicious behavior, compromised hosts and more so that incident response teams can quickly react to a threat.
“Quickly detecting and eliminating previously unknown threats across all applications is key to protecting an organization from today’s advanced threats,” said Lee Klarich, senior vice president of product management at Palo Alto Networks, adding that the company’s approach gives customers the “closed loop capabilities” they need to effectively stop sophisticated threats.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
