{"id":4104,"date":"2019-07-10T10:55:08","date_gmt":"2019-07-10T09:55:08","guid":{"rendered":"https:\/\/10.0.10.213\/?page_id=4104"},"modified":"2019-07-10T10:55:10","modified_gmt":"2019-07-10T09:55:10","slug":"symantec-content-and-malware-analysis","status":"publish","type":"page","link":"https:\/\/sertalink.com\/fr\/symantec-content-and-malware-analysis\/","title":{"rendered":"Symantec Content and Malware Analysis"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/cma-banner.png&#8221; _builder_version=&#8221;3.24&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h3 class=\"textproofleft\">Analyze all content automatically to block advanced threats<\/h3>\n<p>Symantec Content Analysis automatically escalates and brokers zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. Leveraging<span>\u00a0Symantec ProxySG<\/span>, this malware analyzer uses a unique multi-layer inspection and dual-sandboxing approach to reveal malicious behavior and expose zero-day threats, and safely detonate suspicious files and URLs.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Block all known threats identified through<span>\u00a0Global Intelligence Network<\/span><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Deploy multi-step analysis to inspect only suspicious files, including threats targeting mobile devices.<br \/><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Analyze unknown content delivered by Symantec ProxySG or<span>\u00a0messaging gateways<\/span><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Send IOCs to endpoint detection technologies<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Integrate with<span>\u00a0Symantec Endpoint Protection<\/span><span>\u00a0<\/span>Manager<\/span><\/li>\n<\/ul>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/cma-1.png&#8221; _builder_version=&#8221;3.24&#8243; min_height=&#8221;500px&#8221; custom_margin=&#8221;-1px|||||&#8221; custom_padding=&#8221;0px|||||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<div class=\"content-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\">\n<h3 class=\"textproofleft\">New features in Content Analysis<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"media-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\"><\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<p>Content Analysis delivers multi-layer file inspection to better protect your organization against known and unknown threats. Unknown or suspicious content from sources like<span>\u00a0ProxySG, Symantec Messaging Gateway<\/span><span>\u00a0<\/span>or other tools is delivered to Content Analysis for deep inspection, interrogation, analysis and ultimately blocking, if deemed malicious. Recent enhancements to Content Analysis strengthens this platform even further. New features in recent releases include:<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">On-box or cloud sandboxing<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Endpoint\u00a0protection and response through integration with<span>\u00a0Symantec Endpoint Protection<\/span><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Addition of Symantec Antivirus\u00a0and Advanced Machine Learning to Content Analysis for even better detection<\/span><\/li>\n<\/ul>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<div class=\"content-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\">\n<h3 class=\"textproofleft\">Improve threat detection and sandboxing performance<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"media-col content-band\">\n<div class=\"textproof parbase\">\n<h3 class=\"textproofclass\"><\/h3>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<p>Even with the benefit of expensive malware sandboxing technologies, incident response teams are inundated with alerts. Because they can\u2019t tell what\u2019s urgent and what\u2019s not, they often ignore alarms, leaving your enterprise exposed to risk. Symantec Content Analysis delivers effective tools for malware analysis to\u00a0ensure that only truly unknown content is brokered to sandboxes so incident response focuses on real threats, not false alarms.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Analyze all content\u00a0before it is sent to the malware sandbox<br \/><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Prefilter and block all malicious content<br \/><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Utiliser<span>\u00a0proxy inspection<\/span><span>\u00a0<\/span>and dual malware detection engines<br \/><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Centralize and consolidate sandboxes for cost savings for on-premise or cloud products.<br \/><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Focus on real threats, not false alarms<\/span><\/li>\n<\/ul>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\"textproofleft\">Network to Endpoint Detection and Response<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<p>Content Analysis now delivers integration with<span>\u00a0Symantec Endpoint Protection<\/span><span>\u00a0<\/span>(SEP) Manager to provide the network to endpoint visibility, analysis, blocking and remediation that is needed to protect your organization from today\u2019s advanced threats.<\/p>\n<ul>\n<li><span class=\"symantecOrangeBullet\">Send Indicators of Compromise (IOC) to Symantec Endpoint Protection Manager<\/span><\/li>\n<li><span class=\"symantecOrangeBullet\">Validate network-borne threats at the endpoint<\/span><\/li>\n<li><span class=\"symantecOrangeBullet\">Inoculate all other endpoints<\/span><\/li>\n<li><span class=\"symantecOrangeBullet\">Begin swift response and remediation<\/span><\/li>\n<\/ul>\n<p>See how easy integration is and how organization will benefit from bringing these two powerful network and endpoint technologies together.<\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\"textproofleft\">Block malicious threats with flexible sandboxing<\/h3>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<p>While many sandboxes are passive and can only report incoming threats, Symantec Malware Analysis \u2013 built into Content Analysis \u2013 coordinates with inline technologies, delivering real-time sandboxing, discovery, and protection before malware ever reaches a user. A powerful combination of of malware sandbox tools, including virtualization and emulation captures more malicious behavior across a wider range of custom environments, including mobile, than typical single-method sandboxes.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Customize sandbox profiles to represent your \u2018gold\u2019 images<br \/><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Create custom behavioral patterns to detect unique IOCs<br \/><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Detect malware that is crafted to avoid sandbox detection<br \/><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Delay file delivery until analysis is complete<br \/><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Mimic user activity so malware thinks it is being activated<\/span><\/li>\n<\/ul>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\"textproofleft\">For four years in a row Symantec Selected as the Top Leader in Radicati&#8217;s APT Protection Market Quadrant 2019 report<\/h3>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<p>The Radicati group views the Advanced Persistent Threat (APT) Protection market as a set of integrated solutions for the detection, prevention and possible remediation of zero-day threats and persistent malicious attacks. Once again, Symantec Content Analysis plays a critical role in Symantec&#8217;s being selected as the Top Leader in their 2019 report. Symantec achieved this high honor for several reasons, including:<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Symantec\u2019s market share leadership with enterprise customers<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">The variety of deployment options (on-prem, hybrid or cloud) we offer customers<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Our fully-integrated portfolio across Symantec and third-party products and technologies<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">A keen focus on protection at endpoint, gateway, cloud and mobile<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">The massive Global Intelligence Network<span>\u00a0<\/span>for unrivaled threat intelligence<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Symantec&#8217;s integration between ProxySG, Content Analysis, EDR, Security Analytics, SSL Visibility, Web Isolation and more<\/span><\/li>\n<\/ul>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>Analyze all content automatically to block advanced threats Symantec Content Analysis automatically escalates and brokers zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. Leveraging\u00a0Symantec ProxySG, this malware analyzer uses a unique multi-layer inspection and dual-sandboxing approach to reveal malicious behavior and expose zero-day threats, [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-4104","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Symantec Content and Malware Analysis | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/fr\/symantec-content-and-malware-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Symantec Content and Malware Analysis | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/fr\/symantec-content-and-malware-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-10T09:55:10+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/symantec-content-and-malware-analysis\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/symantec-content-and-malware-analysis\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/fr\/#website\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/symantec-content-and-malware-analysis\/#webpage\",\"url\":\"https:\/\/sertalink.com\/symantec-content-and-malware-analysis\/\",\"name\":\"Symantec Content and Malware Analysis | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#website\"},\"datePublished\":\"2019-07-10T09:55:08+00:00\",\"dateModified\":\"2019-07-10T09:55:10+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/symantec-content-and-malware-analysis\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/symantec-content-and-malware-analysis\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/symantec-content-and-malware-analysis\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgique\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/4104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/comments?post=4104"}],"version-history":[{"count":0,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/4104\/revisions"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/media?parent=4104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}