Professional Documents
Culture Documents
Exterro Cerberus Data Sheet
Exterro Cerberus Data Sheet
• Determine both the behavior and intent of security Support options can be found at
breaches sooner by providing complex analysis prior to a https://marketing.exterro.com/support and include:
full-blown malware attack.
• Telephone technical support
• Strengthen security defenses and prevent malicious
• A knowledge base portal containing solutions to common
software from running with state-of-the-art technology
questions
called whitelisting.
• A discussion forum where users can post questions and
Cerberus helps you answer these and other questions:
find answers
1. When does the file run—at startup, or when other • User guides, quick-reference guides and more!
services are activated?
Training options can be found at
2. What ports is it attempting to communicate through? https://training.exterro.com and combine a unique teaching
3. Is it communicating back to a website or other server out methodology with state-of-the-art technology. Options
of your network include in-person classroom, live online, or via our Learning
Management System (LMS). For access to LMS visit
https://marketing.exterro.com/lmstraining
How Cerberus Works
1 2
Criminal creates a virus and arms Executable comes into contact
it with an executable. with Cerberus.
3 4
Cerberus is able to sniff out the Cerberus communicates the
malicious intent of the malware malware’s plan of attack and
by emulating all the paths capabilities to its owner instead
throughout the executable. of merely reporting what it
did during a few executions.
In other words, Cerberus is
Cerberus’ instinctual analysis of
letting the malware think it’s
the situation allows its owner to
calling the shots, while in
quickly identify threats while not
reality, Cerberus is exposing the
wasting time with benign files.
malware to even closer scrutiny.
Since malware can usually detect
By emulating the instructions
that it’s running in a sandbox,
internally, an analyst need
the heightened awareness of
not worry about malicious
Cerberus is essential for triaging
executables invading
an executable that has malicious
their machine because of
intent.
vulnerabilities in the sandbox
environment.