This donation provides a one-year subscription to Topsec Blended Threats Module Service for one mailbox/user.
Topsec Blended Threats provides uncompromising security
Criminals who organize targeted attacks based on blended threats emails use social engineering techniques to craft email messages that appear to be from a trusted sender but actually contain a link to a website hosting malicious code. They will then use a variety of tools for greater access to information and systems. Topsec Blended Threats provides a powerful solution to targeted attacks and blended threats. Using real-time behavioural analysis and content inspection, Topsec Blended Threats blocks any site serving suspicious or malicious code. Because the service doesn’t rely on signatures, it is never out of date when it comes to catching and neutralizing new exploits.
Topsec Blended Threats provides uncompromising security with no management overheads. Running as a cloud-based service means that protection is extended to any recipient who is forwarded a link that has been rewritten by Topsec. Topsec Blended Threats analyses millions of URLs daily, providing protection against targeted attacks and blended threats and feeding into Topsec Lab’s research. Rather than relying on reputation or signature-based protection, it separates a webpage into its individual components (HTML, Java, Flash, ActiveX, etc.) putting each through their own dedicated analytical engines. Any obfuscated or hidden information is decoded and also subjected to rigorous analysis. Then additional deep code analysis determines a behavioural profile that reveals any potential malicious combination of the separate functions. This identifies and mitigates both unknown and dynamic threats. When a website is determined to be hosting malicious code, Topsec Blended Threats will inform the user that access has been denied. As the URL has already been rewritten by Topsec, this protection will be afforded to anybody who is subsequently forwarded the message, including users trying to access the compromised website via a mobile device or over webmail.
How does it work?
Topsec receives the email for scanning and decides that a URL in the message body needs to be analysed. It rewrites the URL, prepending it with a unique customer reference and a link to Topsec Blended Threats.
When a user clicks on the link, the request is directed through Topsec Blended Threats for analysis.
Topsec Blended Threats analyses Web content associated with the link, subjecting it to numerous checks for behaviour and intent.
If the webpage is free from malicious code, it is served to the user. If not, then the user receives a block page indicating that he or she has been protected from a targeted attack.
Receiving Your Product
When the administration fee is received by Enclude you will receieve a fulfilment email within 2-5 working days, this email will include a TOPSEC Customer Setup form.
You must send this completed setup form directly to TOPSEC by emailing firstname.lastname@example.org for provisioning.
TOPSEC will contact you directly to complete your account setup.
Support is provided by TOPSEC by contacting email@example.com or calling 01-426 3300
Multi-layered anti-malware engine featuring Topsec dynamic and real-time code analysis
Both targeted and opportunistic attacks use advanced techniques to evade detection, exploit vulnerabilities and compromise computers. Real-time code analysis identifies the behaviour and intent of code being served by a webpage. It does not rely on signatures to ensure protection against both known and previously unseen attacks, which account for 60% of the modern malware missed by anti-virus, firewall, IPS/IDS and reputation-based solutions. Preventing machines from being compromised in the first place removes the costs associated with being the victim of any successful malware attack, such as desktop reimaging, loss of data, damage to reputation or even fines.
With a rewritten URL, the link is scanned by Topsec Blended Threats whenever a user clicks on the link, even if that email has been subsequently forwarded. This ensures that the target website is scanned at the time of access so there is no window of opportunity for an attack to take place.
Scans websites on access
During a staged targeted attack, the malicious code on a webpage may only become active after a certain period of time or for short spells during a day. This ability to hide, combined with the way active malicious code may change, means that it is essential to scan a website each and every time it is accessed from an untrusted link and the dynamic nature of the webpages.
Block page informs users of a threat
Notifying users of a potential threat not only stops them from visiting a website hosting malicious code, but it also acts as a reminder about safe computing habits, encouraging them to adopt a more cautious approach when browsing the Internet.