Trellix Intelligent Server Defense Solution Brief
Trellix Intelligent Server Defense Solution Brief
Intelligent
server defense
Counter advanced attacks with both
network and endpoint security
SOLUTION BRIEF
Overview
Employees operate in a world where mobile devices constantly interact
with servers in data centers and in the cloud, and share sensitive
data. As remote work becomes the norm, business is more often
Key benefits conducted outside the office. This can leave an open attack path to your
organization’s crown jewels: data, customer information, and intellectual
Address attacks targeted
to a server’s unique attack
property stored on your servers.
surfaces, vulnerabilities,
Servers often run web-facing applications that provide direct attack
and patterns
surfaces from both the internet and within the managing organization.
Detect malicious traffic Threat actors can attack the server directly with an outside-in attack
moving laterally between that scans the server and determines what OS, web services, and
clients and network devices applications are running. They can then use this information to identify
communicating over SMB
vulnerabilities or exploits for compromise.
Reduce time to detect
The cybersecurity industry offers many solutions to protect client
and resolve server attacks
from weeks to hours
endpoints and the network itself, but servers—both Linux and Windows—
have different attack surfaces, vulnerabilities, and patterns than client
Detect attacks others endpoints. Adversaries stay hidden on the servers. In fact, the median
miss with advanced
time before attackers are discovered is 24 days. This gives adversaries
Trellix threat intelligence
time to perform reconnaissance, escalate privileges, steal your
organization’s most sensitive data, and cover their tracks.
The longer an adversary can stay hidden, the more value they’ll gain.
Basic attacks such as malware or worms are easily defeated, so modern
attackers use web shells as a remote access trojan; a few simple lines of
code installed on the web server provide backdoor access or access to
the server file system.
These few lines of code look similar to code that exists on the server, and
unless the web shell is active, it’s not easy to detect. Using web shells,
adversaries can modify web servers to redirect search engine requests
to a compromised web page. Or they can present content to the search
engine that’s different from what the user sees. Locating a web shell
usually requires a user-agent change of the crawler bot.
Analyzing web server logs can determine the location of the web shell,
but the process is time consuming because every suspect log must
be reviewed. And during the process, the attack continues.
After they determine how the attack occurred, your security team
can prevent further infection by resolving vulnerabilities or patching
infected systems. Similar proactive fixes can be applied across
uninfected servers as a preventative measure.
Better together
With this combined solution, Trellix cuts the time to detect and resolve
attacks from weeks to hours. Dealing with infected files or applications
drops from days to minutes. Trellix provides your organization with an
Trellix end-to-end detection and investigation lifecycle for deep data center
6220 American Center Drive attacks that no other vendor can match.
San Jose, CA 95002
www.trellix.com To learn more about Trellix, visit trellix.com.
About Trellix
Trellix is a global company redefining the future of cybersecurity. The company’s open and native extended detection and response
(XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their
operations. Trellix’s security experts, along with an extensive partner ecosystem, accelerate technology innovation through machine learning
and automation to empower over 40,000 business and government customers.