Traps Technology: Palo Alto Networks - Traps Technology Overview - White Paper
Traps Technology: Palo Alto Networks - Traps Technology Overview - White Paper
OVERVIEW
Palo Alto Networks Traps™ endpoint protection and response stops threats
and coordinates enforcement with network and cloud security to prevent
successful cyberattacks. Traps blocks known and unknown malware, exploits,
and ransomware by observing attack techniques and behaviors. Additionally, it
enables organizations to automatically detect and respond to sophisticated
attacks by using machine learning and artificial intelligence (AI) techniques
from data collected on the endpoint, network, and cloud.
Behavior-Based Protection
Sophisticated attacks that use multiple legitimate applications and processes for malicious operations have become more
common, are hard to detect, and require deeper visibility to correlate malicious behavior. For behavior-based protection to be
effective, including identification of malicious activity occurring within legitimate processes, it’s critical to understand every-
thing happening on the endpoint. Traps enacts behavior-based protection in a few different ways.
TR
WF
Pre-Exploit Protection
Traps prevents the vulnerability-profiling techniques exploit kits use prior to launching attacks. By blocking these techniques, Traps
prevents attackers from targeting vulnerable endpoints and applications, effectively preventing the attacks before they begin.
ROP
✖
Heap Heap
EXE
spray Utilize OS spray
functions
NETWORK
ENDPOINT
Figure 5: Integration of endpoint, cloud, and network data with Cortex XDR
Traps on Mac
Traps secures macOS systems against malware and exploits with more than just “checkbox” security. Traps malware prevention
includes multiple methods, such as local analysis, WildFire inspection and analysis, Gatekeeper enhancements, trusted publisher
identification, and administrator override policies. The methods of exploit prevention available include kernel privilege escalation
protection and technique-based exploitation mitigation, which includes JIT and ROP mitigation as well as dylib hijacking protection.
Traps prevents attackers from bypassing the macOS digital signature verification mechanism, Gatekeeper. This mechanism allows
or blocks the execution of applications based on their digital signatures, which are ranked in three “signature levels”: Apple System,
Mac® App Store®, and Developers. Traps extends Gatekeeper functionality to enable customers to specify whether to block all
child processes or allow only those with signature levels that match or exceed those of their parent processes.
Traps on Android
Traps prevents known malware and unknown APK files from running on Android endpoints. The Traps app enforces your
organization’s security policy as defined in the Traps management service. The security policy determines whether to block
known malware and unknown files, upload unknown files for in-depth inspection and analysis, treat malware as grayware, or
perform local analysis to determine the likelihood that unknown files are malware. You can also whitelist trusted signers to
enable unknown, signed apps to run before Traps receives an official verdict for the app.
Traps on Linux
Traps protects Linux servers by preventing attackers from executing malicious ELF files or exploiting known or unknown Linux
vulnerabilities to compromise endpoints. The agent also extends protection to processes that run in Linux containers. Traps
enforces your organization’s security policy as defined in the Traps management service. When a security event occurs on your
Linux server, Traps collects forensic information you can use to analyze the incident further. Traps on Linux operates transparently
in the background as a system process. When you install it on a Linux server, Traps automatically protects any new or existing
containerized processes regardless of how the container is deployed and managed.
Cloud-Based Management
The multi-region, cloud-based Traps management service saves you from investing in building out your own global security
infrastructure and ties in to Palo Alto Networks Security Operating Platform for additional integration and value. The service is
simple to deploy and requires no server licenses, databases, or other infrastructure to get started, enabling your organization to
protect hundreds or millions of endpoints without incurring additional operating costs.
Intuitive Interface
Traps was designed to address security teams’ growing responsibilities with an interface that makes it easy to manage policies
and events as well as accelerate incident response. Elements include:
• Multiple grouping methods, such as partial hostname, domain or workgroup, IP address, range, or subnet.
• Security profiles and simplified, rule-based policies to protect endpoints out of the box while enabling granular customization
for sensitive departments or individuals and easy reuse of settings across different endpoint groups.
• Event workflows to help identify high-priority events and enable teams to communicate on status, progress, and other
useful information. Integrated WildFire analysis displays information such as hash values, targeted users, applications,
processes, and URLs involved in delivery or phone-home activities for incident response.
Coordinated Enforcement
The integrated Security Operating Platform delivers greater security value than isolated components. Whenever a next-
generation firewall sees a new piece of malware, or whenever an endpoint sees a new threat, protections are made available
in minutes to all other next-generation firewalls and endpoints running Traps, requiring no administrative effort, whether it
happens at 1 a.m. or 3 p.m. Tight integration between your network, endpoints, and clouds enables a continually improving
security posture and provides coordinated enforcement to protect you from zero-day attacks.
New malware WF
300M samples detected by
WildFire monthly
WILDFIRE ANALYSIS
WF
Of malware detected
45% by WildFire is never
seen by VirusTotal
Static Machine learning Dynamic Bare metal
THREAT INTELLIGENCE
Threat intelligence
shared across endpoint,
network, and cloud
NETWORK ENDPOINT CLOUD
3000 Tannery Way © 2019 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 trademark of Palo Alto Networks. A list of our trademarks can be found at
Main: +1.408.753.4000 https://www.paloaltonetworks.com/company/trademarks.html. All other
Sales: +1.866.320.4788 marks mentioned herein may be trademarks of their respective companies.
Support: +1.866.898.9087 traps-technology-overview-wp-022519
www.paloaltonetworks.com