Advanced Endpoint Malware Protection


Stop advanced threats with intelligent security

Last year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an all-time high.

Warrior Networks Advanced Endpoint Malware Protection is a solution designed to protect against advanced threats with powerful, layered protection backed by industry leading security intelligence.

Faced with the rapidly changing threat landscape, current endpoint security solutions and antivirus can no longer prevent security breaches on the endpoint.

Our advanced endpoint protection replaces traditional antivirus with a unique combination of the most effective, purpose-built, malware and exploit prevention methods that pre-emptively block known and unknown threats from compromising a system.

Multi-Method Prevention

Threat actors rely primarily on two attack vectors to compromise endpoints: malicious executables (malware) and vulnerability exploits. These attack vectors are used individually or in various combinations, but they are fundamentally different in nature:

  • Malware is an often self-contained malicious executable that is designed to perform nefarious activities on a system.
  • Exploits are weaponized data files or content (such as a Microsoft® Word document) that is designed to leverage software flaws or bugs in legitimate applications to provide an attacker with remote code execution capabilities.Preventing attackers from compromising endpoints and servers requires an advanced endpoint protection product that prevents both known and unknown variants of each malware and exploit, and also delivers this prevention whether a machine is online or offline, on-premise or off, connected to the organization’s network or not. In fact, effective breach prevention cannot be achieved unless all of these requirements are met simultaneously.

Due to the fundamental differences between malware and exploits, meeting these requirements necessitates an approach that combines multiple threat prevention methods that are optimised to either prevent the execution of malicious programs or prevent vulnerability exploits from subverting legitimate applications.

Our advanced endpoint protection replaces traditional antivirus with a multi-method prevention approach that combines the most effective, purpose-built, malware and exploit prevention methods to protect endpoint systems from known and unknown threats.

Multi-Method Malware Prevention

Our solution prevents malicious executables with a unique, multi-method prevention approach that maximises the coverage against malware while simultaneously reducing the attack surface and increasing the accuracy of malware detection. This approach blends several layers of protection that, when combined, instantaneously prevent known and unknown malware from infecting a system.

Warrior Networks Static Analysis via Machine Learning:

This method delivers an instantaneous verdict on any unknown executable file before it is allowed to run. By examining hundreds of the file’s characteristics in a fraction of a second, this method determines if it is likely to be malicious or benign without reliance on signatures, scanning or behavioral analysis. The threat intelligence available through WildFireTM cloud-based malware analysis environment is used to train the machine learning model of to autonomously recognise malware, especially variants that have never been seen before, with unmatched effectiveness and accuracy.

Warrior Networks Wild Fire Inspection and Analysis:

This method leverages the power of Wild Fire to rapidly detect unknown malware and automatically reprogram to prevent known malware. The solution queries WildFire with the“hash” of any executable file before it is allowed to run, in order to assess its standing within the global threat community.

If it has been deemed malicious, Traps automatically reprograms itself to prevent the execution of that file from that moment on. If the executable file is unknown, Traps submits it to WildFire for complete inspection and analysis. WildFire, in turn, eliminates the threat of the unknown by transform- ing it into known in about 300 seconds.

Next-Generation Security Platform

Advanced Endpoint Malware Protection

Advanced Endpoint Malware Protection






With the ever-decreasing cost of computing power, threat actors can launch increasingly numerous and sophisticated attacks with far greater ease than before. Disjointed layers of security and point solutions that rely on obsolete technologies or human response to alerts are no longer sufficient or scalable. Only a platform that consolidates, automates and natively integrates multiple preventive technologies can ensure the prevention of advanced, targeted and evasive attacks.

The native integration of Traps with the Palo Alto Networks Next-Generation Security Platform enables orga- nizations to continuously share the growing threat intelligence gained from thousands of enterprise customers across both networks and endpoints to deliver prevention

System Requirements and Platform Support

Traps protects unpatched systems and is supported across any platform that runs Microsoft Windows: desktops, servers, industrial control systems (ICS/SCADA), virtual desktop infrastructure (VDI) components, virtual machines (VM), and embedded systems

Operating Systems

Windows XP (32-bit, SP3 or later)
Windows Vista (32-bit, 64-bit, SP1 or later; FIPS mode)
Windows 7 (32-bit, 64-bit, RTM and SP1; FIPS mode; all editions except Home) Windows Embedded 7 (Standard and POSReady)
Windows 8 (32-bit, 64-bit)
Windows 8.1 (32-bit, 64-bit; FIPS mode)
Windows Embedded 8.1 Pro
Windows 10 Pro (32-bit and 64-bit)
Windows 10 Enterprise LTSB
Windows Server 2003 (32-bit, SP2 or later)
Windows Server 2003 R2 (32-bit, SP2 or later)
Windows Server 2008 (32-bit, 64-bit; FIPS mode)
Windows Server 2008 R2 (32-bit, 64-bit; FIPS mode)
Windows Server 2012 (all editions; FIPS mode)
Windows Server 2012 R2 (all editions; FIPS mode)

Virtual Environments

Physical Platforms

VMware ESX Citrix XenServer Oracle Virtualbox Microsoft Hyper-V

SCADA Windows Tablets ATM

Virtual Desktop Infrastructure

Run-Time Footprint

VMware Horizon View Citrix XenDesktop

0.1% CPU Load
250 MB Disk Space

To learn more about our Endpoint Protection Suite, attend an webinar and experience its prevention capabilities firsthand. Alternatively, contact us below to schedule an in-house evaluation for your organization.

<insert contact form>







No comments yet.