Y
yigido
Thread author
About
Trapmine
Trapmine is an endpoint security solution to protect organizations from Advanced Persistent Threat & Zero-Day attacks.
According to the figures, %80 of IT incidents caused by software exploits. We are seeing that software exploits used for APT attacks, sophisticated government espionage & cyber crime campaings. With Trapmine, organizations can block all these sophisticated exploit attacks. Trapmine doesn't try to identify and detect exploit, our solution focuses on attack vectors and block exploitation of your applications.
Most of the endpoint security solutions are based on signature detection technology which limits their protection capabilities to zero-day and private exploits. Trying to identify exploits is useless. Any exploit (zero-day or public) is based on well-known exploitation techniques. With Trapmine, we simply block exploitation techniques instead of identifying exploits. Therefore, Trapmine prevents exploits from succeeding.
Trapmine is backed by SignalSEC Ltd. which is a well-known vulnerability research company in the industry. We are motivated by a desire to discover new vulnerabilities and develop exploits. Our researchers discovered many critical vulnerabilities in widely deployed software created by Microsoft, Adobe, IBM, Novell and SCADA vendors. Therefore, we created Trapmine to make you one steap ahead.
Threat Landscape
Signature-less Zero-Day Prevention
The modern threat landscape is extremely complex and and attacks come in from multiple channels and vectors. The threat actors have different motivations such as cyber espionage, organized crime, sensitive information theft, economic espionage. We also have entered an era of cold cyber-war where nations are targetting each others. It's widely seen that some nations are behind the successful APT attacks. So the volume of sophistacted cyber attacks continues to rise and it makes more difficult for enterprises to stay ahead of the threats.
According to a wide variety of sources:
We are seeing that cyber criminals use exploits which target known & unknown software vulnerabilities.
Drive-by download attacks have become the top threat in last years. The drive-by download attacks are almost launched through compromised legitimate websites which are used by attackers to host malicious code. Attackers usually use hosts malicious exploits to target browser and browser plugins in drive-by download attacks.
Spear-phishing is one of the most favored attack vectors used in cyber espionage campaings. Attackers send phishing messages include a link or attachment (e.g. PDF, Word, Excel, ZIP etc.) leading to infection of the target system, often with custom exploit (i.e. bypassing anti-virus, IPS and IDS systems)
Traditional security solutions don't have enough protection capabilities against these complex cyber threats.
Preventing Malware and Phishing Attacks
Fighting against Targeted Spear-Phishing Attacks
Spear-phishing is the most favored attack vector used in cyber espionage campaings. Office Word file type is one of the most commonly used malware attachments in spear-phishing attacks. Trapmine can protect you from malicious attachments including Office, PDF and more!
Protect against Zero-Day threats
Advanced zero-day attack prevention against QuickTime
Cybercriminals don't care if you're a Fortune 500 company or a startup. Most cyber crimes access your network through vulnerabilities in your software programs. Zero-day attacks continuously target enterprises, government organizations, energy industry and financial institutions for data exfiltration and taking control on your infrastructure.
Protect against Spear-phishing
How Trapmine Blocks Cyber-Espionage Attacks
Phishing emails include attachments leading to infection, often with custom undetectable exploits. Trapmine doesn't try to analyze and detect the attachments. We block the all attack paths, thereby custom exploits becomes ineffective against Trapmine.
Homepage : http://trapmine.com/
Twitter : https://twitter.com/Trapmine
Youtube Channel : https://www.youtube.com/user/TrapmineTv
Trapmine
Trapmine is an endpoint security solution to protect organizations from Advanced Persistent Threat & Zero-Day attacks.
According to the figures, %80 of IT incidents caused by software exploits. We are seeing that software exploits used for APT attacks, sophisticated government espionage & cyber crime campaings. With Trapmine, organizations can block all these sophisticated exploit attacks. Trapmine doesn't try to identify and detect exploit, our solution focuses on attack vectors and block exploitation of your applications.
Most of the endpoint security solutions are based on signature detection technology which limits their protection capabilities to zero-day and private exploits. Trying to identify exploits is useless. Any exploit (zero-day or public) is based on well-known exploitation techniques. With Trapmine, we simply block exploitation techniques instead of identifying exploits. Therefore, Trapmine prevents exploits from succeeding.
Trapmine is backed by SignalSEC Ltd. which is a well-known vulnerability research company in the industry. We are motivated by a desire to discover new vulnerabilities and develop exploits. Our researchers discovered many critical vulnerabilities in widely deployed software created by Microsoft, Adobe, IBM, Novell and SCADA vendors. Therefore, we created Trapmine to make you one steap ahead.
Threat Landscape
Signature-less Zero-Day Prevention
The modern threat landscape is extremely complex and and attacks come in from multiple channels and vectors. The threat actors have different motivations such as cyber espionage, organized crime, sensitive information theft, economic espionage. We also have entered an era of cold cyber-war where nations are targetting each others. It's widely seen that some nations are behind the successful APT attacks. So the volume of sophistacted cyber attacks continues to rise and it makes more difficult for enterprises to stay ahead of the threats.
According to a wide variety of sources:
1- %80 of IT incidents caused by software exploits:
We are seeing that cyber criminals use exploits which target known & unknown software vulnerabilities.
2- More than 40,000 websites are infected every day:
Drive-by download attacks have become the top threat in last years. The drive-by download attacks are almost launched through compromised legitimate websites which are used by attackers to host malicious code. Attackers usually use hosts malicious exploits to target browser and browser plugins in drive-by download attacks.
3- Spear-phishing is on the rise:
Spear-phishing is one of the most favored attack vectors used in cyber espionage campaings. Attackers send phishing messages include a link or attachment (e.g. PDF, Word, Excel, ZIP etc.) leading to infection of the target system, often with custom exploit (i.e. bypassing anti-virus, IPS and IDS systems)
Traditional security solutions don't have enough protection capabilities against these complex cyber threats.
Preventing Malware and Phishing Attacks
Fighting against Targeted Spear-Phishing Attacks
Spear-phishing is the most favored attack vector used in cyber espionage campaings. Office Word file type is one of the most commonly used malware attachments in spear-phishing attacks. Trapmine can protect you from malicious attachments including Office, PDF and more!
Protect against Zero-Day threats
Advanced zero-day attack prevention against QuickTime
Cybercriminals don't care if you're a Fortune 500 company or a startup. Most cyber crimes access your network through vulnerabilities in your software programs. Zero-day attacks continuously target enterprises, government organizations, energy industry and financial institutions for data exfiltration and taking control on your infrastructure.
Protect against Spear-phishing
How Trapmine Blocks Cyber-Espionage Attacks
Phishing emails include attachments leading to infection, often with custom undetectable exploits. Trapmine doesn't try to analyze and detect the attachments. We block the all attack paths, thereby custom exploits becomes ineffective against Trapmine.
Homepage : http://trapmine.com/
Twitter : https://twitter.com/Trapmine
Youtube Channel : https://www.youtube.com/user/TrapmineTv
Last edited by a moderator: