TOP

Products

ZombieZERO Inspector V3.0

Overview of ZombieZERO Inspector
About APT

APT: Advanced Persistent Threat
This is a hacking technique used by hackers to create various security threats to attack the network of the targeted company or organization non-stop using their method of choice (e.g. email, web, etc.). The most well-known APT method is to take control of the staff’s computer and access the internal server or database to obtain or destroy confidential information.

About Ransomware

This is a type of malware that encrypts all the images and document files on the infected computer to prevent access to them. The hacker will then demand money from the victim to restore access to the encrypted data.

ZombieZERO Inspector V3.0

ZombieZERO Inspector is a security solution that detects and blocks APT, new malware and malware variants. It is an information security system that helps prevent security incidents such as data leakage and network paralysis, in addition to providing protection against ransomware. Consisting of an endpoint detection and response (EDR) component and a network packet analysis and defense component (Inspector), it minimizes false positives for accurate judgment and rapid response and even detects and blocks malware attempting to bypass the network.

ZombieZERO Inspector’s Dual Defense System
ZombieZERO Inspector can detect and block malware attempting to bypass the network with its dual defense system comprised of an endpoint detection and response (EDR) component and a network packet analysis and defense component (Inspector).

Strengths of ZombieZEROInspector
  • Linked Analysis by the Agent & Network
    · A linked analysis of the information analyzed by the agent and the network information to minimize false positives for improved accuracy
    · Independent behavior-based analysis by the agent and network
    · Detection and blocking of malware (encryption and latent) that bypasses the network security system
    · Blocking of illegal outbound traffic
  • Dual Defense
    · Primary defense against malware using a network behavior-based analytics engine for incoming files and secondary defense using an agent behavior-based analytics engine at the endpoint
  • Multi Analysis
    · Performs signature-based detection to check for known malware and then an analysis using a behavior-based analytics engine to detect new and unknown malware

TOP