CTM Endpoint Module

Light-weight signature-less endpoint malware protection

CTM Endpoint Module

Every device connected to your network, be it a PC, laptop, tablet or smartphone, represents a threat that could compromise your network security. Because many cyber attackers today gain entry to corporate networks through employees’ devices, endpoint protection has become one of the most critical areas of network security.

Cyber criminals use a variety of stealth methods to gain access to organization’s computing systems, including spoofing users or spreading malware to get access to passwords, login information and sensitive corporate assets. Granting network access to contractors and temporary workers also represents security hazards.

As Richard McFeely, head of the Criminal, Cyber Response branch of the FBI, told The New Yorker magazine, “Some of the biggest espionage cases we’re working on right now involve the home-to-work commuting thing.” Source: TheNewYorker

Our Solution

In response to the endpoint challenges that have emerged, Fox-IT developed a new generation of enterprise security — one that delivers visibility, detection, forensics and protection in a single solution. Our CTM Endpoint Module provides state-of-the-art protection from endpoint-focused cyber attacks to secure your corporate assets and sensitive information. It builds a protective barrier between your corporate system assets and the applications that have access to the host systems that house them. This barrier is used to monitor and control exactly how individual programs interact with the host system.

Instead of blocking the exploit phase by looking for malware signatures like traditional antivirus systems do, the CTM Endpoint Module blocks the payload execution phase. By setting rules and normal usage parameters, applications can only perform prescribed behavior. Every action an application tries to conduct outside the rule set is automatically blocked by the prevention feature. In this way, the application can execute perfectly as intended, without gaining access to the system to install malware.

Key benefits

  • 24-7_DB
    Real-time monitoring & protection

    Real-time security monitoring and recording for Windows based endpoints

  • System Security_DB
    Signature-less detection

    Use a specialized form of white-listing to detect anomalies and to block malicious exploits

  • Tracing_DB
    Endpoint visibility

    Gain in-depth understanding of what happens on your endpoint ecosystem

  • Forensic_DB
    Incident Triage

    Instant emergency response and forensics analysis capabilities

  • Focus_DB
    Low impact on Systems

    Small endpoint footprint ensures a very low impact on system performance

  • Dassboard_DB
    Flexible mode of operation

    Endpoint supports monitoring and/or prevention modes of operation as your infrastructure requires

Why Fox-IT?

Fox-IT understands that security is an ongoing process that should cover detection, prevention, response and intelligence. Our security specialists have a thorough understanding of these elements, gained from extensive operational experience in providing a wide variety of security services. We have a long history of incorporating threat intelligence in our way of working. This is the key characteristic throughout the services we deliver.

We track the most serious threat actors and gathering and analyze threat intelligence on a 24/7 basis. Fox-IT applies its knowledge of the latest cyber threats directly in its services and uses it to design, build and validate innovative solutions that protect against both regular and advanced persistent threats. The resulting solutions are then utilized in our ongoing operations, professional services and made available to our clients. This approach has led to the development of one of the most advanced Security Operation Centers in the world.