Organizations face a new breed of cyber attacks that easily thwart traditional defenses. Today’s threat landscape demands a fundamentally new approach, one that does not rely on binary signatures, lists, or rules to detect threats. 

Aware that yesterday’s defenses are no match for today’s attacks, many vendors have begun hawking sandbox-based products as the answer. But most are bolt-on additions to legacy offerings—constrained by technologies that are not architected for new threats.

This paper examines the limitations of many security architectures, including sandbox-based products. And it explains the FireEye advantage—an architecture built from the ground up to protect against today’s advanced attacks and evolve as threats change.

Download this paper to learn:

  • Why signature-based defenses are powerless against today’s advanced threats
  • The limitations of on-premises sandboxes
  • Why sandbox-generated hash codes have limited value
  • The importance of multi-vector analysis
  • The architectural advantages of the FireEye Threat Prevention Platform

The FireEye Advantage: A New Security Approach for Today’s Advanced Attacks

Complimentary White Paper


Signature based technology is the most common form of malware detection used in AV software, IPS devices, and Web gateways. Unfortunately for organizations that rely on these defenses, signatures are woefully ineffective. Today’s malware is polymorphic, changing constantly. Binary signatures reflect only the malware’s state when first identified—not new variants. Because of this mismatch, binary signatures fail to detect most malware samples—about 60,000 new malware variants are released daily. Making matters worse, cybercriminals use a bevy of techniques to evade signature-based detection. Common evasion tacks include file encryption and portable executable packers.

To read more, complete the form to the right.

Download the Report

© 2017 FireEye, Inc. All rights reserved. Privacy Policy. FireEye on Facebook    FireEye on Twitter    FireEye on LinkedIn    FireEye Blog: Malware Intelligence Lab