iboss FireSphere Adds Network Anomaly Monitoring to APT Functions

A security technology company has upgraded one of its tools to flag malware that may already be working inside the network. iboss, which last fall released FireSphere, its advanced persistent threat software, has enhanced it with new functionality.

FireSphere was launched with several features:

  • Infection monitoring to detect and respond to malware in progress;
  • Network baselining to establish the normal chain of activities in order to be able to spot anomalies;
  • A device quarantine to fence off infected devices;
  • A behavioral sandbox to detect, isolate and "dissect" malware and other kinds of attacks;
  • Intrusion prevention through data inspection, network traffic scanning and SSL anomaly detection; and
  • Signature and heuristic antivirus, which uses feeds from multiple sources to stay up on the latest malware.

The latest version uses technology developed by the company to perform anomaly monitoring on network traffic to expose more sophisticated and evasive forms of malware. The software compares previous data logs of network traffic to current traffic in order to "pinpoint" odd behavior or activities that can signal a compromise. Then it stops data transfer, quarantines the traffic and alerts network administrators.

The monitoring process examines device category, number of bytes in or out, number of connections being attempted, who owns the device and the intended destination, among other parameters.

The software can be deployed from the cloud or in appliance form.

"Organizations must have technology in place to mitigate loss if and when a network is compromised," said CEO Paul Martini. "FireSphere focuses on data movement across the network, particularly on outbound communication, to ensure organizations have complete insight into threats to immediately remediate potential problems."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.

  • hand typing on laptop with security and email icons

    Copilot Gets Expanded Role in Office, Outlook, and Security

    Microsoft has doubled down on its Copilot strategy, announcing new agents and capabilities that bring deeper intelligence and automation to everyday workflows in Microsoft 365.

  • Graduation cap resting on electronic circuit board

    Preparing Workplace-Ready Graduates in the Age of AI

    Artificial intelligence is transforming workplaces and emerging as an essential tool for employees across industries. The dilemma: Universities must ensure graduates are prepared to use AI in their daily lives without diluting the interpersonal, problem-solving, and decision-making skills that businesses rely on.

  • business man using smart phone in office

    Microsoft Copilot Adds Voice Commands, Teams Collaboration, Local Data Processing

    Microsoft has introduced new features within its Microsoft 365 Copilot offering, aimed at making further foothold in the enterprise, including voice-based interaction, group collaboration tools, and an expansion of in-country data processing.