Fighting Threats with Behavioral Analysis

Webroot's Kennedy on a Different Anti-Malware Approach
A behavioral analysis approach to fighting malware can be more effective than a signature-based approach in the current threat environment, contends Webroot's Patrick Kennedy.

Protecting endpoints against the very latest malware threats by using a signature-based approach, which relies on detecting known patterns of data, is inadequate, he argues.

"Cloud-based behavioral analysis looks at the intent of the file, rather than trying to match a file against a signature," he explains. "It looks at what the file was created to do, it analyzes the behavior in real time, and it matches that against like behavioral patterns in the cloud."

In an interview at the Infosecurity Europe 2014 conference in London, Kennedy discusses:

  • How the cloud-based behavioral analysis process works;
  • Why the behavioral analysis approach is effective at detecting zero-day;
  • How a "journaling and rollback" process can detect emerging threats over time.

Kennedy is vice president of product marketing and sales enablement at Webroot. Previously, he worked at Symantec and 3Com.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.