NEXOR AND GLASSWALL COLLABORATE TO DELIVER A SOLUTION TO MITIGATE THE BEEBUS STYLE OF THREAT

March 2013

Nexor, the UK Market Leader in connecting and protecting sensitive information in cyberspace, has announced today that it has collaborated with Glasswall Solutions to provide a patented security product that directly addresses the Beebus style of threat and is expected to transform computer security.

It is becoming increasingly evident that current Antivirus software simply cannot keep up with the threat of Zero day malware, especially in PDF files, which are now recognised as a common source of malware infection. The recent scandal following the Beebus headlines highlights the importance of taking this threat seriously, both in terms of receiving infected files, and also in checking files being sent out of the organisation. This will give assurance that they are malware free, as well as avoiding exposure to potential legal and reputational damage to the organisation.

Beebus threats from documents such as PDFs has motivated Glasswall Solutions and Nexor to join forces to provide the ‘next generation’ of malware Defence engineered to provide critical information security for organisations. The partnership incorporates Glasswall Solutions’ patented technology into the Nexor Secure Information Exchange architecture to produce a product suite that will be available as a standalone server or as a Cloud service and protects enterprises against advanced and persistent malware attacks embedded in files.

The solution operates by inspecting the contents of files at a detailed level during transfer such as email. The suite will classify the contents as ‘good’ or ‘bad’ using a set of policies which can be tailored to the client’s individual requirements. The file is then regenerated containing only the ‘good’ content, ensuring it is clean and malware free. The file is then reattached to the email along with a notification to the user that it is safe.

Colin Robbins, Nexor’s CTO, comments, “Current Antivirus technology has reached the plateau of what it can achieve. The combination of Nexor and Glasswall technologies provides a new approach that is not dependent on signatures that describe what is known to be bad historically. This enables customers to have confidence that they are protected from the next Beebus like zero-day attack hidden in documents.”

Sam Hutton, Glasswall Solutions’ CTO, comments, “Glasswall’s normalising technology is a fundamentally different approach to neutralising malware. It regenerates files to a known, enforceable standard providing a sanitised, safe document that can be delivered with confidence.”

<br /><a class="twitter-timeline" href="https://twitter.com/Nexor" data-widget-id="697041719305568257" data-tweet-limit="2">Tweets by @Nexor</a><script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>

RECENT BLOG POSTS

Press Release – Guardian 3.1 – High Availability

Nexor are pleased to announce that our Guardian solution has been enhanced with a number of key features in a new release 3.1 of the guard application which is now available: Increased Reliability: Deploy as an active -passive High-Availability ("HA") application...

Making Effective Use Of Zero Trust Security

One year on from our introductory blog on Zero Trust Architecture,  what has changed and what friction points have started to appear for organisations after implementation? Crucially, where does Zero Trust fit within the to-do list, or the essential security risk...

Cyber Essentials – Under The Bonnet

What does Cyber Essentials cover? Cyber Essentials is a UK Government backed scheme that helps protect your business against a range of the most common cyber-attacks.  Cyber-attacks can come in many forms and may be carried out against businesses of any size of...

Be the first to know about developments in secure information exchange