Be first in the detection of freshly-minted zero day malware by building SigFree signature-free technology into your security applications. DayZero Systems has introduced SigFree Software Development Kit v1.1 with support for 32 and 64-bit Windows systems.
This fully functional SDK is available as a 30-day free trial - available via download from Digital River.
User examples of integration of SigFree technology into apps for true proactive Zero Day protection include:
· Security Software Firms – Add Zero Day malware detection to your existing Threat Management Suites.
· Security and Forensic Consultants – Build new detection tools that set you apart from your rivals.
· Large Corporate – Build custom proactive protection based on SigFree signature-free technology.
· Entrepreneurs – Bring new SigFree-based disruptive products to market, redefining the standard for protection from newly minted, unknown malware code and delivery systems.
SigFree is signature-free. It does not rely on traditional malware detection methods such as pattern, string or hash matching. Yet, SigFree does not slow down the host system. SigFree detects executable code, and its threat potential, in data packets, all file formats, and residing in memory. It defeats obfuscation, polymorphism and other malware self-defense techniques. Your imagination and skill is the limit. SigFree SDK can be used to build Intrusion Protection Systems that reach beyond current state-of-the-art. Use the SigFree engine to provide Web Server, End Point and Browser Protection, even perform Memory Analysis. With SigFree, you will detect malware you could never detect by other means.
The SigFree SDK v1.1 32/64-bit comes with everything you need to build your application including a robust set of API’s and a comprehensive development guide. You’ll also find case studies on Browser and Web Server Protection and Memory Analysis, with performance results, at http://dayzerosystems.com/case-studies.
The SigFree DLL can detect malicious http/https requests. Such malicious traffic is frequently used for buffer overflow attacks. For example, in testing the SigFree DLL was deployed as a proxy-based web server protector. See the Case Study including results using 5,000 simultaneous clients.
Use the SigFree SDK to create or enhance firewalls, protect end points from malware introduced through detached media, or to periodically scan memory. One subset of end point protection is Browser Protection below.
Browser plug-ins, including ActiveX controls, are only one of the major vulnerabilities of browsers that can infect your network and attached devices. SigFree development including testing of both standalone and client-server browser plug-in protectors. See the Case Study including client-server results with up to 1,000 simultaneous users.
SigFree can be used as an online or offline memory analysis tool. As an offline tool, it can be used to analyze large volumes of traffic for improvement of your device's security agent, development of patches, and creation of valid white and black lists. Please also see the brief Case Study.
Whether you're an ISV, an ISP/Hosting Firm, have a large in-house network or have Clients with large in-house networks - use the SigFree SDK to improve and add new functionality to you Unified Threat Management Suites - add zero day protection for newly launched threats.
Whether a computer, server, content manager, or add-on card manufacturer - use the SigFree SDK to add new functionality and a higher level of protection - add zero day protection with SigFree.