Zero Day - Provision Software
page-template,page-template-full_width,page-template-full_width-php,page,page-id-819,cookies-not-set,ajax_fade,page_not_loaded,,qode-title-hidden,qode_grid_1400,footer_responsive_adv,qode-theme-ver-16.4,qode-theme-bridge,wpb-js-composer js-comp-ver-5.4.7,vc_responsive

Zero Day

Zero-day protection

Zero-day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw. The term zero day may refer to the vulnerability itself, or an attack that has zero days between the time the vulnerability is discovered and the first attack. Once a zero-day vulnerability has been made public, it is known as an n-day or one-day vulnerability.


When someone detects that a software program contains a potential security issue, that person or company will notify the software company so it can fix the code and distribute a patch or software update. Even if potential attackers hear about the vulnerability, it may take them some time to exploit it; meanwhile, the fix will hopefully become available first.


Sometimes, however, a hacker may be the first to discover the vulnerability. Since the vulnerability isn’t known in advance, there is no way to guard against the exploit before it happens. Companies exposed to such exploits can, however, institute procedures for early detection.


FireEye NX series & PX series appliances

FireEye helps organization through NX series appliances and PX series appliances as follows:

                -NX series appliances can detect the intrusions, block the attacker and alert system administrators of the attended breach;

                -PX series appliances (FireEye Network Forensics appliances for packet capture and analysis) enable responders to freeze and rewind time,                                isolating the package captures from the earliest moments of the attack to ensuring with Dynamic Threat Intelligence Cloud enables FireEye to                    analyze the attack.

The zero day discovery team reverse engineers to incidents, to break down the inter-disease of the exploit. Using Threat intelligence gathered by FireEye devices and drawing upon years of in-depth knowledge and specialized techniques will find the key exploit mechanisms and will determine if this particular combination of tactics is a zero day.  If it a zero day is discovered, FireEye notifies the vendor of the vulnerable software and works with them to create a patch. Meanwhile, comprehensive data about the exploit is uploaded to Dynamic Threat Intelligence Cloud, which immediate notifies every FireEye appliance and protects FireEye customers.

Within 24 hours the patch is deployed, the public is notified and customers are protected from a campaign that took threat actors countless hour to craft.

When faced with advanced threats, such zero days exploit, you need advanced threat protection.

Bitglass Next-Gen CASB platform

Together, Zero-day Core platform’s four components offer comprehensive security for unmanaged apps, managed apps, and any device.

                  -Zero-day Unmanaged App Control – Bitglass can leverage its patent-pending machine-learning to detect and control zero-day data leakage paths in any unmanaged application.

                  -Zero-day Malware Protection – Through a built-in, Cylance-powered engine, only Bitglass can detect known and zero-day malware for cloud applications.

                  -Zero-day Managed App Control – With the Next-Gen CASB, achieve data protection, threat protection, identity management, and visibility for any SaaS, custom, or packaged software application – no signatures or changes to applications are required.

                  -Zero-day Agentless Proxy with AJAX-VM – Bitglass’ real-time, agentless reverse proxy solution secures any application on any device, ensuring continued functionality as client-side code changes.

Forcepoint Advanced Malware Detection Appliance

Forcepoint Advanced Malware Detection Appliance is an on-premises, automated malware analysis framework developed for organizations needing to add detection and prevention against stealthy and advanced threats to their existing Forcepoint Web and Email Security solutions.

Forcepoint Advanced Malware Detection Appliance framework’s unmatched efficacy processes files through seven distinct static analytic agents and a dual-sandboxing process. Its ecosystem analyses malware behavior with a combination of best-of-breed open source and Forcepoint proprietary static and dynamic technologies.

Forcepoint Advanced Malware Detection Appliance is used to defend the integrity of highly valuable national security secrets and financial institutions’ critical data.

It is capable of analyzing any and ALL file types (PDF files, Windows executables, Office documents, HTML files, Windows shortcut (.lnk) files, zip files, jar files and more) with exclusive sandboxing representing multiple combinations of operating systems and applications; it’s able to customize multiple baselines in order to mimic your organization’s infrastructure more accurately than any other on the market.

Forcepoint Advanced Malware Detection is now available as an optional add-on to Forcepoint CASB, NGFW, Web Security or Email Security as a cloud service, or as software to be implemented on premises for those with technical or other restrictions.

McAfee Advanced Threat Defense

McAfee Advanced Threat Defense enables organizations to detect advanced, evasive malware and convert threat information into immediate action and protection. Unlike traditional sandboxes, it includes additional inspection capabilities that broaden detection and expose evasive threats. Tight integration between security solutions—from network and endpoint to investigation—enables instant sharing of threat information across the environment, enhancing protection and investigation. Flexible deployment options support every network.

McAfee Advanced Threat Defense detects today’s stealthy, zero-day malware with an innovative, layered approach. It combines low-touch analysis engines such as antivirus signatures, reputation, and real-time emulation with dynamic analysis (sandboxing) to analyze actual behavior. Investigation continues with in-depth static code analysis that inspects file attributes and instruction sets to determine intended or evasive behavior and assesses similarity with known malware families. A final step in the analysis, McAfee Advanced Threat Defense specifically looks for malicious indicators that have been identified through machine learning via a deep neural network. Combined, this represents the strongest advanced malware security protection on the market and effectively balances the need for both in-depth inspection and performance.

McAfee Advanced Threat Defense can integrate in different ways: direct with select security solutions, through McAfee Threat Intelligence Exchange, or through McAfee Advanced Threat Defense Email Connector.

Flexible advanced threat analysis deployment options support every network. McAfee Advanced Threat Defense is available as an on-premises appliance or a virtual form factor, with support for both private and public cloud with availability in the Azure Marketplace.

Malwarebytes Endpoint Security, Endpoint Protection, Endpoint Protection and Remediation

Endpoint Security (on-premises), Endpoint Protection (cloud-based), Endpoint Protection and Remediation (cloud-based).

All 3 solutions offer Multi-Vector Protection against all varieties of threats, including ransomware, malware, zero-day exploit, adware and viruses.

Layer of protection include: Web Protection, Application Hardening, Application Behavior, Exploit Mitigation, Payload Analysis, Ransomware Mitigation and Anomaly Detection Machine Learning (available only for Malwarebytes Endpoint Protection and Malwarebytes Endpoint Protection and Remediation Products).