Print This Page
The ability to identify behavior of malware based on events. For example, inbound email with attached targeted malware to be filtered via the use of a secure virtual machine to identify when the payload is triggering atypical activity.