menu

Contact Us

1 (800) 723-1166 |

security

Homesecurity
Homesecurity

Part One - Security, Performance, Obfuscation & Compression

Historically, the majority of traditional AV solutions have relied on static signatures to identify known malware. As a result, malware authors naturally started employing a range of tools to obfuscate the underlying code of their software in order to avoid such signature based detection and to hinder (human) static analysis.

These obfuscation tools have proliferated over the past years, with numerous commercial offerings available as even legitimate software authors look to at least hinder the reverse-engineering of their products. While the methods and results vary, the ultimate intention is now usually to make the code discouragingly hard to read (as opposed to the original design intent behind traditional packers which was to decrease the file-size of an executable).

This series of blog posts will look at a range of techniques commonly used to avoid detection by antivirus products and the ready availability of these tools.

GDPR: The Final Countdown

Forcepoint Reveals CASB UBA, Enhanced Cloud App controls, and the Availability of the Most Effective Zero-day Malware Detection

Forcepoint continues to deliver innovation at a rapid pace, providing enhancements to several products and enabling organizations to securely embrace business in the cloud. Security professionals should be aware of recent activity including:

Bringing the Human Point to Life

Behind the Scenes of Our New Brand Campaign

Putting a Human Face on The Human Point

If you’ve recently been to Forcepoint’s website or had the opportunity to visit with us at the Gartner Security and Risk Management conference a few weeks ago, you may have noticed our brand looks a lot different than other security companies.

Forcepoint India Solution Day

Human-centric approach key to protecting employees, critical business data and IP

Pages