There are no flawless software systems or applications. When these flaws result in security vulnerabilities, threat actors may exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments in a timely fashion. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use as required for other business strategies.

This document presents a case study that discusses the security, risk and compliance ramifications of operating unpatchable systems and application such as legacy Windows® Operating Systems (e.g., Windows XP, Windows 8).  These may still be found in older ATMs and aging endpoints that support check scanners, printers for passbooks, ATM cards, and other legacy banking applications.

The case studies outline the core attack vectors that threat actors can use to compromise unpatchable systems and applications and offer a technical solution that eliminates the reliance on vulnerability patches as a security measure while preventing breaches on the endpoints that operate those unpatchable systems and applications.  This advanced endpoint protection uses a multi-method approach to detect and address exploits and malware while using machine learning, as well as static and dynamic analysis to identify cyber threats.

For more information on cybersecurity for the financial sector, visit our Financial Services industry page at  https://www.paloaltonetworks.com/products/security-for/industry/financial-services.html


 

Traps Advanced Endpoint Protection AV-Comparatives Award

AV-Comparatives, the independent organization that tests and assesses antivirus (AV) software, announced the completion of its 2017 “Comparison of Next-Generation Security Products” and presented Traps advanced endpoint protection with its “Approved” award. The firm conducted a series of malware protection and exploit prevention tests on Traps during September and October 2017. Download the report to view the results of this test.
  • 2
  • 11646

Traps: Advanced Endpoint Protection

Palo Alto Networks Advanced Endpoint Protection represents a complete paradigm shift from identification to pure prevention. Providing comprehensive exploit and malware prevention that is not designed to identify; instead, it prevents an attack before the malware can be successful.
Santa Clara, CA
  • 29
  • 62752

Traps Advanced Endpoint Protection Technology Overview

Most organizations deploy a number of security products to protect their endpoints, including one or more traditional antivirus solutions. Nevertheless, cyber breaches continue to increase in frequency, variety and sophistication. Faced with the rapidly changing threat landscape, current endpoint security solutions and antivirus can no longer prevent security breaches on the endpoint. Palo Alto Networks® Traps™ advanced endpoint protection replaces traditional antivirus with a unique combination of the most effective, purpose-built, malware and exploit prevention methods that pre-emptively block known and unknown threats from compromising a system.
Santa Clara, CA
  • 8
  • 40546

2018 NSS Labs Advanced Endpoint Protection Report

Palo Alto Networks advanced endpoint protect Traps achieved the rating of “Recommend” in the 2018 NSS Labs Advanced Endpoint Protection (AEP) Test. This test aims to determine how effectively the AEP product can protect against a threat, regardless of the infection vector or method of obfuscation. The AEP test evaluated several vendors ability to detect, prevent, continuously monitor and take action against malware, exploits, evasions and blended threats.
  • 3
  • 5014

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.
  • 2
  • 2491

Health Check and Configuration Audit

The Palo Alto Networks Certified Professional Services Program (CPSP) enables and promotes qualified partners who have demonstrated professional services capabilities and expertise.
Palo Alto Networks,
  • 1
  • 5510