IDS / BDS

[et_pb_section fb_built=”1″ _builder_version=”3.22.4″ background_image=”https://www.secondwrite.com/wp-content/uploads/2019/07/header.png”][et_pb_row _builder_version=”3.25″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://www.secondwrite.com/wp-content/uploads/2019/07/white_line-1.png” align=”center” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.23″][/et_pb_image][et_pb_text _builder_version=”3.22.4″]

What is SecondWrite?

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22.4″][et_pb_row _builder_version=”3.25″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://www.secondwrite.com/wp-content/uploads/2019/07/gray_line.png” align=”center” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.23″][/et_pb_image][et_pb_text _builder_version=”3.26.5″ text_font_size=”16px”]

Why SecondWrite?

There is no way around it, you are going to be left with files which you are not certain are malicious or benign.
That is where SecondWrite comes in. The typical use case is shown below.
[/et_pb_text][et_pb_text _builder_version=”3.26.5″ custom_margin=”50px||”]

Customers: IDS/BDS vendors.

Sandboxing is computationally expensive. Can not send every file on the network to SecondWrite.

[/et_pb_text][et_pb_image src=”https://www.secondwrite.com/wp-content/uploads/2019/08/Screenshot-2019-08-01-at-20.27.44-e1564689047271.png” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.26.5″][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22.4″ background_image=”https://www.secondwrite.com/wp-content/uploads/2019/07/bg.png”][et_pb_row _builder_version=”3.25″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://www.secondwrite.com/wp-content/uploads/2019/07/white_line-1.png” align=”center” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.23″][/et_pb_image][et_pb_text _builder_version=”3.26.5″ text_font_size=”16px”]

How it works

SecondWrite is the result of 5 years of research and 2 patented technologies on binary rewriting and forced code execution which provides SecondWrite with technologies you cannot find anywhere else.

Those technologies are Forced Code Execution, Program Level Indicators and Automatic Sequence Detection.

[/et_pb_text][et_pb_image src=”https://www.secondwrite.com/wp-content/uploads/2019/08/idb_new.png” align=”center” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.26.5″][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22.4″][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25″][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://www.secondwrite.com/wp-content/uploads/2019/07/gray_line.png” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.23″][/et_pb_image][et_pb_text _builder_version=”3.22.4″]

What This Means

[/et_pb_text][et_pb_text _builder_version=”3.26.5″ text_font_size=”16px”]

In a test complete by VirustTotal on 6877 pieces of malware and 5600 benign files the average detection rate from the top 20 endpoint tools was 79%.

On the same data set SecondWrite’s detection was 94%.

Using our patented technology and Forced Code Execution we were able to find 50% more IOCs than without Forced Code Execution (FCE) technology. No other sandbox has FCE technology

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://www.secondwrite.com/wp-content/uploads/2019/07/graph.png” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.23″][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section]