The complexity and speed at which malware propagates across the internet requires anti-malware vendors to react quickly and to have considerable computing power to dissect potentially malicious traffic. The concept of using the cloud to enhance protection, whether through scanning, analyzing, or for statistical data, is a feature common across the anti-malware industry. So, how is cloud technology used exactly?
When ESET’s endpoint software finds new infiltrations on a computer, these potential threats get sent directly for enhanced scanning and research. To begin, each sample is subjected to automatic sandboxing and behavioral analysis. Then, if needed, experts analyze the sample and continually monitor the potential threat. The entire process results in the creation of automated detections if malicious characteristics are confirmed. All ESET endpoints benefit from and learn about these automated detections via the cloud’s reputation system which removes the need to wait for any update of the detection engine.
This process improves scanning efficiency and enables faster sharing of malware intelligence, ultimately improving the protection of your device and of the entire internet.
Imagine the scenario where your device is one of the first to see a new threat. Unbeknown to you, it may have triggered a new detection for all machines that then see this malicious attempt and stop it before it does any harm. This ecosystem of protection works a bit like an automated neighborhood watch scheme that helps to keep your systems safe.