escort

APT email security solution

Email Security Solution, Integration with behavior analysis engine and software vulnerability detection/attack blocking engine

Email Security Solution
Integration with behavior analysis engine and software vulnerability detection/attack blocking engine

  • E-mail overseas@igloosec.com

Product Introduction

Recently, spear-phishing that infects user’s PC with malicious codes by disguising as work-related content is becoming more elaborate. eSCORT is a solution that removes URL links included in emails by email security solution, and detects and blocks malicious codes in attachments.

  • Remove URL links
    inserted in the main
    text of the email

    Remove URL links
    inserted in
    the main text
    of the email

  • Blocks known malicious codes
    (pattern based detection)

    Blocks known
    malicious codes
    (pattern based detection)

  • Behavior-based

    Behavior-based

  • Detects the forgery of
    extension of
    attachment

    Detects the forgery
    of extension
    of attachment

  • Security
    Intelligence

Advantages of eSCORT

Advantages : Knowledge, Synergy, Analysis
  • Knowledge

    Provides real time threat information provided by AppleDore system and external institutions

  • Synergy

    Integration with behavior based engine and vulnerability analysis engine

  • Analysis

    Suspicious malicious codes are analyzed at K-CENTER of IGLOO SECURITY

Main Features of eSCORT

1 Remove unknown malicious codes

  • Before running
    malicious code

    Pre-exploitation
    Pre-exploitation stage

    exploit

  • Run malicious code

    Exploitation
    Exploitation stage

  • Malicious and suspicious
    behavior occurs

    Post-exploitation
    Post-exploitation stage

Work flow

  • Malicious file

    Static Engine

  • Action Analyzing Engine

    Weakness Detecting Engine

  • Block

Malicious file, Static Engine Engine /process, file, network, registry, service, Action Analyzing Engine, Weakness Detecting Engine  / Block
Malicious file, Static Engine Engine /process, file, network, registry, service, Action Analyzing Engine, Weakness Detecting Engine  / Block

2 The attachment infected by known malicious code

  • The attachment infected
    by malicious code

  • Utilize the Anti-virus solution

  • Block the malicious code

3 Remove the malicious URL link inserted in the text of email

4 Detect the forgery of extension of attachment

System Structure of eSCORT

System Structure of escort System Structure of escort System Structure of escort
  • Internet
  • Email collection system
    • Deliver email if there is no attachment Send email
    • Attachment analyzing system
    • Detect and remove malicious code
    • Parallel expansion of analyzing system
    • Transmit result
    • Deliver email after completing inspection
  • Email server
  • User