Powered by Digital DNA®

CounterTack’s Digital DNA Technology Licensing Program

If you are an existing security vendor, hardware manufacturer, software provider, or cloud-based solution company, CounterTack is now offering Digital DNA® (DDNA) the only patented memory analysis technology that automatically reverse engineers memory images and examines code for potentially malicious behavioral traits & threats.  You can easily integrate Digital DNA technology (software development kit: driver, API, and library) into your product or service and offer immediate a value-added security service to your customers.

Why Digital DNA?

Digital DNA has unparalleled memory forensics and behavioral analysis capabilities that detects zero-days, rootkits and other malware not detected by signature-based solutions. Digital DNA cuts through the wide array of anti-forensic measures employed by today’s most stealthy malware and identifies potentially malicious software running in physical memory.

Digital DNA Scans Live Physical Memory Identifying Malicious Behaviors Rather than Matching Patterns and Signatures. DDNA, our patented core technology, lies at the heart of all of our malware detection, analysis and forensics products.  With its unparalleled memory forensics and behavioral analysis capabilities, Digital DNA detects zero-days, rootkits and other malware not detected by signature-based solutions. Digital DNA cuts through the wide array of anti-forensic measures employed by today’s most stealthy malware and identifies potentially malicious software running in physical memory.


PHYSICAL MEMORY IS THE PLACE TO DETECT MALWARE THREATS
memory forensics

Digital DNA proactively identifies and analyzes the most advanced malware threats in physical memory, including those used against global organizations for theft of intellectual property, business intelligence, customer records, and classified information. Digital DNA performs the following steps:

  • Scans live physical memory or memory snapshots
  • Identifies behaviors and techniques rather than patterns and signatures
  • Calculates a module-level threat score based on identified behaviors
  • Detects malicious software, APTs, zero-days, and rootkits that traditional anti-virus software can’t

MALWARE THREATS THAT MAY RESIDE ON DISK IN MANY DIFFERENT FORMS EXHIBITS INDENTICAL TRAITS IN MEMORY
malware detection

All software modules residing in physical memory are identified and ranked by level of threat severity so incident responders, at a glance, can determine quickly how to allocate their resources to mitigate the risk to their business environment.
View the technology brief