Palo Alto Networks WildFire
Developed by Mimecast
Reduce Risk With Layered Security
Key Benefits
-
Optimized malware detection and prevention of zero day exploits
using both the Mimecast and Wildfire cloud-based analysis and globally crowdsourced intelligence -
Richer and more detailed context and intelligence
on detected threats, accessible through both the Mimecast and Wildfire dashboards and reporting tools -
Alerts and optional automated mailbox remediation
for message attachments found to contain malware -
Detailed reporting
on threats detected, blocked and remediated by both Mimecast and Wildfire
Solution Overview
Integration between Mimecast Targeted Threat Protection and Palo Alto Networks WildFire maximizes your security investments through optimized malware detection using the techniques of both technologies, with cloud-based analysis, inline machine learning-based prevention, and globally crowdsourced intelligence to better protect your organization.
As Mimecast receives email attachments, they pass through the Mimecast inspection funnel, where each file is checked against a number of proprietary and commercial antivirus engines. Files not flagged by the antivirus engines are subject to static file analysis and/or traditional sandboxing. Whether a scanned email attachment contains malware or Mimecast’s attachment scanners see it as clean, the file is sent to WildFire for a second opinion.
In the event WildFire subsequently detects that a file contains malware, a predefined user or group is alerted to take action. If your organization’s Mimecast subscription includes the Threat Remediation feature, you can also trigger an automated mail- box remediation of the email or emails containing the malware attachment, ensuring that the threat is neutralized as soon as possible. The next time the malware is detected via email, it will be automatically blocked, ensuring no further spread of the malware in your organization.
WildFire sandbox analysis is available for all files submitted by Mimecast, whether they are found to be malicious or benign. This analysis is available using the WildFire Reports feature.