Clarium Managed Services firmly believes that a truly secure IT eco-system doesnt end at the firewall! Most cyber attacks originate internally from vulnerable end points and ineffective AV solutions. For this reason Clarium has partnered with Palo Alto Networks and “TRAPS” to deliver the most secure and innovative end point security.
Palo Alto Networks Traps replaces traditional antivirus with multi-method prevention, a proprietary combination of purpose-built malware and exploit prevention methods that protect users and endpoints from known and unknown threats. Traps prevents security breaches, in contrast to breach detection and incident response after critical assets have already been compromised.
Traps Advanced Endpoint Protection:
Most organizations deploy a mixture of security solutions to protect their endpoint systems, including one or more traditional antivirus solutions. With the proliferation of free and low-cost tools, threat actors can now generate new and unique attacks that evade signature-based antivirus. Current endpoint security solutions and antivirus cannot protect users and systems against evasive, unknown or zero-day attacks.
Palo Alto Networks® Traps™ advanced endpoint protection, with its unique combination of the most effective, purpose-built, malware and exploit prevention methods, prevents known and unknown threats before they compromise an endpoint.
Traps prevents malicious executables with a unique, multi-method prevention approach that maximizes the coverage against malware while simultaneously reducing the attack surface and increasing the accuracy of malware detection. This approach combines several prevention methods to instantaneously prevent known and unknown malware from infecting a system.
Any executable file that is deemed to be malicious and prevented from running on the endpoint is quarantined in a protected repository accessible only to system administrators. Traps administrators can review quarantined files, delete them, or restore them to their original location on their respective endpoints, if necessary.
Traps uses an entirely new and unique approach to prevent exploits. Instead of focusing on the millions of individual attacks, or their underlying software vulnerabilities, Traps focuses on the core exploitation techniques used by all exploit-based attacks. Each exploit must use a series of these exploitation techniques to successfully subvert an application. Traps renders these techniques ineffective by blocking them the moment they are attempted. Organizations using Traps can run any application, including those developed in-house and those that no longer receive security support, without the imminent threat to their environment.
Traps implements a multi-method approach to exploit prevention, combining several layers of protection to block exploitation techniques:
|Memory Corruption Prevention||Logic Flaw Prevention||Malicious Code Execution Prevention|
The native integration of Traps with the Palo Alto Networks Next-Generation Security Platform enables organizations to continuously share the growing threat intelligence gained from thousands of enterprise customers across both networks and endpoints to coordinate prevention and response. The automatic reprogramming and conversion of threat intelligence into prevention all but eliminates the opportunity for an attacker to use unknown and advanced malware to infect a system. An attacker can use each piece of malware once, at most, anywhere in the world and only has seconds to carry out an attack before WildFire renders it entirely ineffective.
With the ever-decreasing cost of computing power, threat actors can launch increasingly numerous and sophisticated attacks with far greater ease than ever. Disjointed layers of security, and point solutions that rely on obsolete technologies or human response to alerts, are no longer sufficient or scalable. Only a platform that consolidates, automates and natively integrates multiple preventive technologies can ensure the prevention of advanced, targeted and evasive attacks.
Traps protects unpatched systems and is supported across any platform that runs Windows®: desktops, servers, industrial control systems, virtual desktop infrastructure (VDI) components, virtual machines (VM), and embedded systems.
Windows XP (32-bit, SP3 or later)
Windows Vista (32-bit, 64-bit, SP1 or later; FIPS mode)
Windows 7 (32-bit, 64-bit, RTM and SP1; FIPS mode; all editions except Home)
Windows Embedded 7 (Standard and POSReady)
Windows 8 (32-bit, 64-bit)
Windows 8.1 (32-bit, 64-bit; FIPS mode)
Windows Embedded 8.1 Pro
Windows 10 Pro (32-bit and 64-bit)
Windows 10 Enterprise LTSB
Windows Server 2003 (32-bit, SP2 or later)
Windows Server 2003 R2 (32-bit, SP2 or later)
Windows Server 2008 (32-bit, 64-bit; FIPS mode)
Windows Server 2008 R2 (32-bit, 64-bit; FIPS mode)
Windows Server 2012 (all editions; FIPS mode)
Windows Server 2012 R2 (all editions; FIPS mode)