0% found this document useful (0 votes)
8 views5 pages

SED Cont Analysis PB104

The document outlines Symantec's Content Analysis, a multi-layered threat protection solution designed to block, detect, and analyze threats at the gateway level. It integrates with various Symantec security tools to provide comprehensive protection against known and unknown malware through advanced detection techniques and sandboxing. The solution is aimed at enhancing security for enterprises facing sophisticated cyber threats and is available in multiple deployment configurations.

Uploaded by

zcsxa4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views5 pages

SED Cont Analysis PB104

The document outlines Symantec's Content Analysis, a multi-layered threat protection solution designed to block, detect, and analyze threats at the gateway level. It integrates with various Symantec security tools to provide comprehensive protection against known and unknown malware through advanced detection techniques and sandboxing. The solution is aimed at enhancing security for enterprises facing sophisticated cyber threats and is available in multiple deployment configurations.

Uploaded by

zcsxa4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Product Brief Content Analysis

Advanced, Multi-Layer
Threat Protection
Block, Detect and Analyze Threats with Automated,
Advanced Threat Protection at the Gateway
AT A GLANCE Enterprises are vulnerable to increasingly sophisticated exploits. Increased
• Multi-layered security for effective exposure requires a new defense that combines prevention with more
defense against known and effective attack detection, analysis, and response.
unknown threats, and a critical
Symantec® Content Analysis is a critical component that is included
component of a complete Secure
Access Service Edge (SASE)
with Symantec Web Protection. Content Analysis uses a comprehensive
solution approach to security that offers unequaled protection against known,
unknown, and targeted attacks. Paired with Symantec Secure Web
• A key component of Symantec Gateway (SWG), Secure Messaging Gateway, Symantec Endpoint Security,
Web Protection for deep file
Security Analytics, or other third party tools, Content Analysis takes a
inspection
layered approach to threats targeting network, mail, or endpoint traffic.
− Quickly analyzes suspicious files Content Analysis uses Symantec multi-layered detection for allow list/block
and URLs, interacts with running list and file reputation services, antimalware detection, machine learning,
malware to reveal its complete and deep inspection and detonation through on-box or cloud sandboxing.
behavior, and exposes zero-day Together, this fusion of content and malware analysis is the best protection
threats and unknown malware. against targeted malware attacks. Content Analysis is designed to protect
− Filtered, on-prem, or cloud organizations from viruses, Trojans, worms, spyware, and other malicious
sandbox analysis for efficient content across the network, endpoints, or targeting email.
and thorough inspection of truly
unknown files
Inline Threat Analysis
− Prioritized analysis reduces
Sophisticated attacks come in many forms, designed to avoid detection
the number of alerts SOC and
by siloed, single-purpose blocking tools; no single technology effectively
incident response teams must
address
stops all threats. Content Analysis takes a different approach and offers a
platform for multi-layered/multi-vendor threat detection and protection to
• Deployed on the same hardware as dramatically reduce the number of alerts that SOC and Incident Response
Symantec Edge SWG, as a VM, or teams need to address. By incorporating Symantec SWG and Secure
in the cloud for improved ROI and
Messaging Gateway, Content Analysis provides the following services:
flexibility
• Integrates with Symantec and • Blocks known malicious URLs and emails at the gateway
partner ecosystem • Leverages Symantec File Reputation Services (FRS) and conducts
extensive allow list and block list scanning
• Analyzes unknown files through advanced machine learning and static
code file analysis
• Scans content with the Symantec multi-layered inspection engine for
greater detection accuracy
• Detonates unknown files through sophisticated sandboxing
• Integrates with many security tools including Symantec Endpoint
Security to provide endpoint visibility, protection, and response

Content Analysis
Product Brief

Multi-layer Threat Inspection Architecture


ENDPOINT INTEGRATION Content Analysis architecture allows Broadcom to partner with
technology vendors to offer enhanced protection. Leading
Content Analysis integrates with antimalware engines are supported with up-to-the-minute updates,
Symantec Endpoint Security and providing better protection than desktop antimalware alone. Up
other endpoint solutions. When to two antimalware engines can be employed simultaneously to
sandbox analysis determines a file is improve detection and blocking. Threat detection engines include
malicious, Content Analysis queries these integrated features:
the endpoint manager to determine
if any workstations in the network • Checksum signature matching for known threats
have been infected. That information
• Command and control behavioral analysis for preemptive
is then included in the report to
detection
the administrator and provides the
options to add the file hash to a • Emulation mode for deep script and executable analysis
block list or run a remediation policy
to protect against further infection
throughout the organization.

Figure 1: After Edge or Cloud SWG scrutinizes web traffic, Content Analysis analyzes any files within that traffic based on hash
reputation, advanced machine learning, and then scans for malware and viruses using the Symantec multi-layered inspection engine.
Any remaining unknown files are sent on to dynamic sandboxing.

Edge SWG Cloud SWG

Messaging Gateway Endpoint Security Web, Endpoint,


Email Traffic

Endpoint Detection
Security Analytics
and Response

1
Roaming/
Mobile Users
JAR .EXE

Content Analysis

2 Hash Reputation
Custom user allow list/block list + Risk Scoring

1. Unknown files sent to Content


3 Static CodePredictive File Analysis
Analysis, Advanced Machine Learning Analysis from multiple sources

2. Files scanned against custom


user allow list/block list and scored
On Premises
4 Antimalware/Antivirus
Symantec inspection Engine
3. Predictive File Analysis including
Advanced Machine Learning
In the Cloud
5
Malware Analysis
Service (MAS) 4. Antimalware/antivirus scanning
using multiple inspection engines
Additional Sandbox Dynamic Sandboxing
Virtual Machine + Emulation Sandboxing
5. If still unknown, detonation occurs
Multi-layer threat inspection, detection
in the sandbox (on-premises or cloud)
and sandboxing uncover the unknowns.

Content Analysis
Product Brief

Flexible Configuration Options


Flexible configuration allows both inbound and outbound traffic analysis
SYMANTEC FILE and includes options such as set time-out duration, drop file if errors
REPUTATION SERVICES in detection occur, real-time sandboxing to prevent patient zeros, and
defining trusted sites. Set policies for allow/deny lists, with extensions,
Content Analysis generates along with file size and content type restrictions. Alerts and log files can
hashes for each file it processes. also be customized. This powerful Advanced Threat Protection at the
These hashes are then compared gateway is available as part of Symantec Web Protection at no additional
with the Symantec cloud-based charge, with the following deployment options:
File Reputation Services (FRS)
classification to identify known • High-performance hardware to meet the demanding needs of the largest
files. The service uses reputation networks
scores that indicate whether files • Optimized virtual appliances to reduce hardware expense, support
are “known” trusted or malicious.
branch offices, or for deployments in cloud environments like AWS
Depending on the reputation
score files are then either blocked • Cloud-hosted Secure Web Gateway and Deep File Inspection
if malicious, passed to the user (Sandboxing) Services that deliver industry-leading threat protection
if safe, or further processed with
antivirus scanning and sandboxing. Effectively Combat Advanced Threats
Symantec FRS enables crowd
Content Analysis thwarts targeted attacks with threat intelligence from
sourced security – any file that is
multiple sources, integrated with leading web proxy and email gateway
detonated in a Content Analysis
architectures to block malicious web sessions and emails. Traffic is filtered
sandbox by one customer is shared
through multiple levels of inspection to stop malware from entering your
with the FRS service and therefore
blocked if that file shows up at
organization. Detect and block more exploits, better manage threat
another Symantec customer. analysis— even on the fastest of networks— and reduce false positives. The
strongest protection available requires layered, orchestrated technology
that only Symantec provides.

Thirty Days of Actual Traffic at a Fortune 20 Customer


Figure 2: In this example from a real customer, Symantec Edge SWG and Content Analysis analyzed billions of web requests using a
multi-stage process and filtered them down to only a handful of valid alerts that required further investigation by a security team.

Symantec Edge SWG Content Analysis Content Analysis


Secure Web Gateway File Inspection Sandboxing

All Web Traffic 41.7B 2.4B 539K 389


Risky files
Web Requests Files Scanned Files Sandboxed
identified

Prior to Content Analysis,


4,000 events sent to SOC
for investigation
48.1M malicious 7.7K files blocked
sites blocked

Content Analysis
Product Brief

Content Analysis Physical Appliance Options


Content Analysis can be deployed on the same Secure Web Gateway appliances as Symantec Proxy.

Secure Web Gateway Appliances SSP-S210-10 SSP-S410-20B SSP-S410-40B


Platform Specifications
System
CPU 1 x 16 core 2 x 10 core 2 x 20 core
2.0 GHz 2.2 GHz 2.1 GHz
C3958 Atom 4210 Cascade Lake 6230 Cascade Lake
Memory 64 GB (DDR4 SDRAM) 96 GB (DDR4 SDRAM) 384 GB (DDR4 SDRAM)
Storage SSD 2 x 960 GB 2 x 960 GB 2 x 1.9 TB
Boot Drive (SATA) 2 x 64 GB 2 x 64 GB 2 x 64 GB
Power Supply 2 x 300W 2 x 1200W 2 x 1200W
Network Interface - Data 4-port 1GbE Copper 2 X 2-port 10GbE Copper 2 X 2-port 10GbE Copper
Network Interface - Management 1GbE Copper 1GbE Copper 1GbE Copper
Optional Network Interface Cards Quad Port 10GbE Copper (with bypass capability), Quad Port 1GbE Copper (with bypass
capability), Quad Port 10GbE Fiber (LC, with bypass capability), Dual Port 10/25GbE Copper
Rack Specifications
Shipping Dimensions and Weight
Width 580 mm/22.83 in. 610 mm/24.01 in. 610 mm/24.01 in.
Overall Depth 925 mm/36.42 in. 995 mm/39.17 in. 995 mm/39.17 in.
Height (on Pallet) 245 mm/9.65 in. 290 mm/11.41 in. 290 mm/11.41 in.
Shipping Weight (Approximate) 17.8 kg/38.14 lb 26 kg/57 lb 26 kg/57 lb
Appliance Dimensions and Weight
Width 438 mm/17.24 in. 483 mm/19.01 in. 483 mm/19.01 in.
Overall Depth 471 mm/18.55 in. 826.8 mm/32.55 in. 826.8 mm/32.55 in.
Height (One Rack Unit (RU) with Casters) 43.5 mm/1.71 in. 43.5 mm/1.71 in. 43.5 mm/1.71 in.
Appliance Weight (Approximate) 9.02 kg/19.88 lb 22 kg/48.5 lb 22 kg/48.5 lb
Operating Environment
Main Input Power - PDU Dual 100–240 VAC, ~/4A, Dual 100 to 240 VAC, 7.08A, Dual 100 to 240 VAC, 7.08A,
50 to 60 Hz 47 Hz to 63 Hz 47 Hz to 63 Hz
Facility Power Interface Type B, 5-15R, 120 VAC Type B, 5-15R, 120 VAC Type B, 5-15R, 120 VAC
Power 300W (Max.) 1200W (Max.) 1200W (Max.)
Thermal Rating (Maximum) 1025 BTU 4096 BTU 4096 BTU
Operating Temperature 0°C to 40°C/32°F to 104°F 0°C to 40°C/32°F to 104°F 0°C to 40°C/32°F to 104°F
Non-operating Temperature –20°C to 70°C/–4°F to 158°F –40°C to 70°C/–40°F to 158°F –40°C to 70°C/–40°F to 158°F
Operating Relative Humidity 20% to 95% RH 20% to 85% RH 20% to 85% RH
Non-operating Relative Humidity 10% to 95% RH 10% to 85% RH 10% to 85% RH
Operating Altitude 3,000m 3,000m 3,000m
Non-operating Altitude 12,000m 12,000m 12,000m

Content Analysis
Product Brief

Content Analysis Physical Appliance Options (cont.)


Secure Web Gateway Appliances
Regulations Safety Electromagnetic Comp
International UL: UL 60950 1, 2nd Edition CISPR22:2008 Class A; CISPR32 Class A
cUL: CAN/CSA C22.2 No. 60950 1 07, 2nd Edition
CB: IEC 60950 1:2005 +A2:2013+ Summary with
National Differences: EN 60950 1:2006+A2:2013
USA UL: UL 62368 1, 2nd Edition FCC part 15, Class A /ANSI C63.4 2014
Canada cUL: CAN/CSA C22.2 No. 62368 1 14, 2nd Edition ICES-003, Issue 6 Class A / CAN/CSA CISPR 22 10
European Union (CE) CB: IEC 62368 1:2014 (Second Edition) Summary with EN 55011, EN 61000 6 3, EN 55032, CISPR 32, Class A
National Differences: EN 62368 1:2014+A11:2017 EN 61000 3 2 / EN 61000 3 3, EN 55024 / EN 61000 6 1,
EN 61000 4 2 / EN 61000 4 3, EN 61000 4 4 / EN 61000 4
5, EN 61000 4 8 / EN 61000 4 11
Japan — VCCI V-3, Class A
Mexico NOM-019-SCFI by NRTL Declaration —
Argentina S Mark – IEC 60950-1 —
Taiwan BSMI – CNS-14336-1 BSMI – CNS13438, Class A
China CCC – GB4943.1 CCC – GB9254; GB17625
Australia/New Zealand AS/NZS 60950-1, Second Edition AS/ZNS-CISPR32, AN/NZS CISPR 32:2015 + C1:2016 ED.2.0
Korea — KC – RRA, Class A, KN32/KN35, KN61000 4 2 / KN61000
4 3, KN61000 4 4 / KN61000 4 5, KN61000 4 6 / KN61000
4 11
Russia EAC - TP TC 004/2011 EAC - TP TC 020/2011
Environmental RoHS-Directive 2011/65/EU, REACH-Regulation No 1907/2006
Product Warranty Limited, non-transferable hardware warranty for a period of one (1) year from date of shipment.
Support contracts available for 24/7 software support with options for hardware.

For more information, visit our website at: www.broadcom.com


Copyright © 2024 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. All
trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
SED-Cont-Analysis-PB104 April 3, 2024

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy