Products

SNIPER APT
SNIPER APT
SNIPER APT implements the behavior/file analysis of network traffics and emails, and accurately identifies and blocks abnormal users attempting intelligent threat (ransomware) attacks, preventing the spread of APT attacks detouring existing security systems.
The sand box-based APT response system analyzes the whole network traffics to proactively detect and cut off latest threat attacks.
Purchase inquiry

SNIPER products that good to be with

Product Outline / Description

SNIPER APT is a full-range defense-in-depth system specialized in APT attacks. Its patented session-based multi-threading packet processing engine employed the high-performance packet processing technology of Korea’s No. 1 WINS IPS (intrusion prevention system) and can collect files in real time in the unique manner of Sniper APT. YARA detection technology was applied to network security solution for the first time to detect and shut off malignant files. 


SNIPER APT, based on Microsoft Interflow, SecureCAST connection with the world’s no. 1 anti-virus signature, comprehensively analyzes threats and can quarantine/block in real time with ransomware pattern and behavior analysis using PC Agent. The system also analyzes in depth document files (Hangul, MS Office, PDF, etc.) mainly utilized for APT attack using the behavior-based analysis and  DANA(Document And Non-PE Analyzer) analysis engines. 


The system presents every information at a look from network attack start to internal user infection with malignant codes, and response status. 


The program employed technologies effective to find the trace of malignant code intrusion such as real-time malignant file and mail analysis record management, attack trend analysis by time, and malignity type distribution map. 

Main Functions

Detection

Detection

  • Real-time user download file extraction (URL, Mail, FTP, etc.)
  • Whole user session collection and analysis
  • Interlocking with SNIPER products and 3rd party products
  • Detecting malware distribution sites and C&C in conjunction with CTI (Cyber Threat Intelligence
Management/Treatment

Management/Treatment

  • Diverse statistics and search
  • Integrated monitoring and policy setting
  • Detailed statistical analysis report on malignant code
  • Email quarantine and monitoring
Analysis

Analysis

  • Malignant code behavior-based (sandbox) analysis
  • MS Office, Hangul, compressed file, etc. analysis
  • Malignant code distribution origin and C&C server extraction
  • Integrated analysis of domestic/global malignant code patterns
Cryptographic Communication

Cryptographic Communication

  • Provide SSL encryption interface for safe central control by integration managers accessing remotely
  • Provide SSL encrypted communication channel for safe control function execution in the Sniper APT Client
Agent (Infected PC Detection, Malignant Code Quarantine, Optional)

Agent (Infected PC Detection, Malignant Code Quarantine, Optional)

  • Infected PC detection/malignant code quarantine
  • Periodic detection policy update
  • Auto/manual malignant code quarantine
  • Support all Window systems (32/64bit)
Latest Vulnerability Response

Latest Vulnerability Response

  • Operation of own WSEC (breach accident analysis response center) for vulnerable database building and continued update
  • Builds the latest reputation database with continuous updates through CTI (Cyber Threat Intelligence) linkage

Features


1_APT_특장점_En.png

Diagram


1_APT_구성도_En.png

Line-up


1_APT_라인업_En.png