The SigFree DLL can detect malicious http/https requests. Such malicious traffic is frequently used for buffer overflow attacks. For example, in testing the SigFree DLL was deployed as a proxy-based web server protector. See the Case Study including results using 5,000 simultaneous clients.
Use the SigFree SDK to create or enhance firewalls, protect end points from malware introduced through detached media, or to periodically scan memory. One subset of end point protection is Browser Protection below.
Browser plug-ins, including ActiveX controls, are only one of the major vulnerabilities of browsers that can infect your network and attached devices. SigFree development including testing of both standalone and client-server browser plug-in protectors. See the Case Study including client-server results with up to 1,000 simultaneous users.
SigFree can be used as an online or offline memory analysis tool. As an offline tool, it can be used to analyze large volumes of traffic for improvement of your device's security agent, development of patches, and creation of valid white and black lists. Please also see the brief Case Study.
Whether you're an ISV, an ISP/Hosting Firm, have a large in-house network or have Clients with large in-house networks - use the SigFree SDK to improve and add new functionality to you Unified Threat Management Suites - add zero day protection for newly launched threats.
Whether a computer, server, content manager, or add-on card manufacturer - use the SigFree SDK to add new functionality and a higher level of protection - add zero day protection with SigFree.