Ed Jaehne, President and CEO
Malware is a real and present danger for companies of all sizes today. According to McAfee and others, there are now more than 750 million malware samples lurking on the internet, and this continues to grow by more than 35 percent each quarter. Cybercriminals are using malware to penetrate cyber defenses of businesses, as the headlines attest. What many small and medium business owners don’t realize is that they are prime targets. In fact, Verizon found in its latest security report that 58 percent of malware attack victims are categorized as small businesses. At risk is a company’s money, customers, reputation, and even its proprietary secrets. Finding malware quickly is the problem, as malware writers continue to innovate on ways to evade detection.
SecondWrite has built a powerful dynamic analyzer for examining and de-coding malware’s true intent. They use patented technology to force malware to expose its secrets by actually executing the hidden malicious code in a protected environment called a sandbox. With its patented technology, SecondWrite’s analyzer, Malware DeepViewTM is able to force the execution of all of the program code contained within a malware program, not just the ones their creators want you to see. In fact, DeepViewTM executes more than 2.5 times program code per malware sample as compared to most competitors.
SecondWrite detects harmful malware with two powerful tools—Forced Code Execution, and Deep Learning. Malware is becoming increasingly evasive as malware writers become ever more ingenious at hiding their malicious code behind conditions and stealth techniques that prevent the code from executing in other security sandboxes. The company then uses Deep Learning models to identify malware program code features and behaviors to analyze and report on malicious malware.
“Our secret sauce is centered on our patented binary rewriter capability coupled with our Deep Learning models,” states Jaehne. SecondWrite’s analyzer is able to bypass the conditions that prevent visibility by executing the questionable program code. “Our binary rewriter is able to modify the binary code and reverse the conditions that are being used to hide the malicious code,” explains Jaehne.
Unlike antivirus and endpoint protection tools that only read the code, SecondWrite provides in-depth analysis and efficient threat management
A study by Aberdeen Group revealed that the longer malware lingers or dwells in your environment, and if it dwells for60 days the malware is likely to inflict a business impact or cost of $1.3 million. Every day that malware is undetected in your environment potentially costs your business $30,000- 50,000. The key to minimizing these losses is to find malware fast and eliminate it. “SecondWrite’s analyzer is able to identify malware on Day Zero, when it arrives in a business environment,” adds Jaehne.
Highlighting SecondWrite’s unique value proposition to minimize malware dwell time, Jaehne describes internal analyses of malware detection rates and dwell time as compared to major leading security platforms. “Our malware detector is finding malware that is eluding other major security platforms for days, weeks and even more.” By integrating DeepViewTM with their security platforms, our security product companies are protecting their customers from costly malware breaches.
Looking forward, SecondWrite continues to improve its Deep Learning models and expanding the types of files and operating systems that it supports. In addition, SecondWrite is working to make its malware reports more user-responsive and easier to use for security analysts, incident responders, and threat hunters. Finally, the company aims to work with other security product companies and security service providers to build platforms that perform better for their customers and protect enterprise networks from malware quickly and cost-effectively.