Whole Security - How IT Works

How It Works

An algorithm is used to evaluate hundreds of attributes relating to software running on a computer. Various factors are considered before determining that a program is malicious, such as if the program adds a shortcut on the desktop or creates a Windows Add/Remove programs entry. Both of those factors would indicate the program is not malware. The main use of SONAR is to enhance detection of zero day threats. Symantec claims SONAR can also prevent attackers from leveraging unpatched software vulnerabilities.

Ed Kim, director of product management at Symantec, expressed confidence in SONAR, "We've done extensive testing on emerging threats, and it catches early threats and variants of existing threats."

Read more about this topic:  Whole Security

Famous quotes containing the word works:

    I meet him at every turn. He is more alive than ever he was. He has earned immortality. He is not confined to North Elba nor to Kansas. He is no longer working in secret. He works in public, and in the clearest light that shines on this land.
    Henry David Thoreau (1817–1862)