About Traps

Cyberattacks are attacks performed on networks or endpoints to inflict damage, steal information, or achieve other goals that involve taking control over computer systems that do not belong to the attackers. Adversaries perpetrate cyberattacks either by causing a user to unintentionally run a malicious executable file or by exploiting a weakness in a legitimate executable file to run malicious code behind the scenes without the knowledge of the user.
One way to prevent these attacks is to identify executable files, dynamic-link libraries (DLLs), or other pieces of code as malicious and then prevent them from executing by testing each potentially dangerous code module against a list of specific, known threat signatures. The weakness of this method is that it is time-consuming for signature-based antivirus (AV) solutions to identify newly created threats that are known only to the attacker (also known as zero-day attacks or exploits) and add them to the lists of known threats, which leaves endpoints vulnerable until signatures are updated.
The Traps solution takes a more effective and efficient approach to preventing attacks thus eliminating the need for traditional AV. Rather than try to keep up with the ever-growing list of known threats, Traps sets up a series of roadblocks that prevent the attacks at their initial entry points—that point where legitimate executable files are about to unknowingly allow malicious access to the system.
Traps targets software vulnerabilities in processes that open non-executable files using exploit prevention techniques. Traps also uses malware prevention techniques to prevent malicious executable files from running. Using this two-fold approach, the Traps solution can prevent all types of attacks, whether they are known or unknown threats.
All aspects of endpoint security settings—the endpoints and groups to which settings are applied, the applications they protect, the defined rules, the restrictions, and the actions—are all highly configurable. This allows each organization to tailor Traps to its needs so that Traps can provide maximum protection with minimal disruption of day-to-day activities.

Related Documentation