Resources

AllWhitepapersVideosWebinarsBrochureSCase StudIESResearchSurveysAnalyst Reports
Video
VIDEO
How to Stop Fileless Attacks with Minerva Labs and McAfee

With the combined power of McAfee and Minerva Labs, evasive malware such as fileless attacks can now be prevented. By easily deploying Minerva via McAfee ePO evasive malware is prevented before any damage is done and new threat intel is fed to McAfee Threat Intelligence Exchange.

Watch >>
Analyst Reports
ANALYST REPORT
2019 TAG Cyber Security Annual

Read Edward Amoroso's interview with Eddy Bobritsky the enterprises' need to account for evasive malware when designing a security strategy.

Download>>
Webinar
WEBINAR
How to Make Threat Intel Actionable During Incident Response

Learn how Minerva together with VMRay automates the analysis and prevention of evasive malware to help IR teams contain and eradicate breaches rapidly.

Register Now>>
Brochure
BROCHURE
McAfee and Minerva Labs Advanced, Evasion-Proof Endpoint Defense

Learn more about Minerva’s Integration with McAfee ePolicy Orchestrator

Download >>
Whitepaper
WHITEPAPER
The Role of Windows Defender Technologies in an Endpoint Security Architecture

Microsoft's Windows Defender naming can be confusing. With 12 distinct technologies, what role does each play in your endpoint security architecture? What are their dependencies and restrictions?

Download >>
Video
VIDEO
CoinMiners are Evasive

Watch Omri Moyal, Co-Founder & VP Research at Minerva Labs and Thomas Roccia, Security Researcher at McAfee give a deep dive into the uncharted of CoinMiners stealth tactics.

Watch >>
Webinar
WEBINAR
Why Do Malicious Office Documents Keep Infecting Me?

Learn what you can do to stop malicious office documents from infecting your endpoints and reduce your organization's vulnerability.

Watch >>
Case Study
USE CASE
Combating Modern Exploit Kits with Minerva

Modern exploit kits incorporate evasion tactics to avoid analysis, which makes Minerva’s Anti-Evasion Platform especially effective at protecting enterprises from such threats.

Download >>
Webinar
WEBINAR
Security Weekly: The State of EDR

Watch this webcast with Lenny Zeltser, Mike Nichols, Mike Scutt, & Paul Asadoorian to learn how to conduct a proper evaluation of your endpoint security strategy.

Watch >>
Webinar
WEBINAR
A CISO's 7 Rules For Evaluating Security Solutions

Join James Rutt, CIO at The Dana Foundation, as he shares his 7 rules for evaluating security solutions and how these apply to different security solutions he recently implemented in the organization.

Watch >>
Video
VIDEO
GhostMiner: Cryptomining Goes Fileless

Watch Security Researcher Asaf Aprozper dissect the GhostMiner campaign and explains how fileless malware techniques were used to launch a cryptomining campaign that went undetected by most AV vendors.

Watch >>
Webinar
WEBINAR
The State of Endpoint Security in Addressing Malware

Watch Lenny Zeltser, Minerva’s VP of Products, as he reviews our recent survey’s findings and shares his analysis of the responses.

Watch >>
Case Study
CUSTOMER STORY
Dana Foundation adds Minerva as part of their endpoint cybersecurity program

Learn what James Rutt, The Dana Foundation CIO, had to say about MInerva's ability to prevent evasive attacks without overlapping with the existing defensive measures.

Download >>
Video
VIDEO
Lenny Zeltser and Eddy Bobritsky’s interview with Enterprise Security Weekly

Watch Security Weekly's recent interview with Lenny Zeltser and Eddy Bobritsky and learn how to test and evaluate endpoint security products.

Watch >>
Survey
SURVEY
The State of Endpoint Security in Addressing Malware and Other Modern Cyber Threats

Download the Minerva Labs 'State of Endpoint Security 2018' survey to discover what 600 IT Security Professionals are challenged with when it comes to addressing malware and other modern cyber threats.

Download >>
Webinar
WEBINAR
The Rise of Malicious Cryptomining

Join Omry Moyal to learn practical tips and tricks on how to block malicious cryptominers.

Watch >>
Whitepaper
WHITEPAPER
Malware and the Hidden Cost of Adding Security to Your MSP Practice

Discover the challenges and opportunities MSPs are facing with putting essential security in place, how to avoid the hidden costs and ensure reliability, predictability, productivity, and profitability.

Download >>
Webinar
WEBINAR
The MSPs Guide to Setting Up Cost-Effective IT Security

Join Lenny Zeltser who will share his expertise in this field and explain the role that MSPs can play in safeguarding customers’ IT infrastructure.

Watch >>
Case Study
CUSTOMER STORY
BlueVoyant Partners with Minerva Labs

Cybersecurity Services firm BlueVoyant partners with Minerva Labs to contain sophisticated malware attacks.

Download >>
Video
VIDEO
Boosting your endpoint security ecosystem

Evasive malware can easily hide in packers to avoid your endpoint security solutions. See how Minerva prevents fileless attacks and adds a critical defense layer to your endpoint security stack.

Watch >>
Case Study
USE CASE
Malware Protection for ATMs

Minerva provides reliable and comprehensive safeguards against ATM malware.

Download >>
Webinar
WEBINAR
How to Evaluate Endpoint Security Products

Get practical tips and tricks for evaluating endpoint security prevention and detection products. We'll share our expertise in malware defenses and product testing.

Watch >>
Case Study
USE CASE
Minerva Labs for Incident Response

Deploying Minerva’s Anti-Evasion Platform as part of the incident response process helps contain the threat automatically and quickly.

Download >>
Case Study
USE CASE
Minerva Labs Remote User Protection

Remote User Protection enables malware-free VPN connections, protecting enterprises from attacks upon initiation of, or during a remote connection.

Download >>
Video
VIDEO
Lenny Zeltser’s interview with Enterprise Security Weekly

Watch Lenny Zeltser's interview with Paul Asadoorian and John Strand from Security Weekly about Minerva's Anti-Malware solution

Watch >>
Webinar
WEBINAR
Covering the AV Gap -The Role of Anti-Evasion and Other Approaches

Understand the pros and cons of various AV augmentation technologies and discover how anti-evasion improves your security posture in a meaningful way.

Watch >>
Whitepaper
WHITEPAPER
Evasive malware: How and why your anti-malware strategy needs to evolve beyond Anti-Virus

Discover the reasons why evasion techniques work, even with a layered defense approach and how to evolve your endpoint protection strategy, to cover the gap.

Download >>
Brochure
BROCHURE
Malicious Document Prevention

Prevent attacks that hide in malicious documents and safely use the full capabilities of day-to-day business apps.

Download >>
Research
RESEARCH
Minerva Labs Research Report: 2017 Year in Review

End of the year offers an opportunity to reflect upon the key events that have shaped 2017 and set the direction for 2018.

Download >>
Research
RESEARCH
Infographic: 2017 - The Year Malware Went More Evasive

Here are the key takeaways of Minerva’s research into the malware families that were prevalent in 2017.

Download >>
Whitepaper
WHITEPAPER
A SANS Institute Product Review

See how Minerva Labs’ Anti-Evasion Platform performed in the SANS Institute test

Download >>
Webinar
WEBINAR
A Year in Review, 2017 Through the Eyes of Minerva Labs

Join Gal Bitensky, Minerva Labs' Senior Security Researcher, who reviews the key trends of 2017, their lasting impact and how these could influence what happens in 2018.

Watch >>
Case Study
USE CASE
Minerva Safeguards VDI Environmentsfrom Unknown Threats

See how Minerva’s Anti-Evasion Platform makes it highly effective for safeguarding Virtual Desktop Infrastructure environments and individual virtual desktops.

Download >>
Case Study
CUSTOMER STORY
Worldwide Shipping Company Guards Thousands of Endpoints Against Ransomware

Minerva Labs blocked more than 95% of attempted attacks. As a result of fewer infections, investigations and reimaging were avoided, saving significant time and resources.

Download >>
Webinar
WEBINAR
SANS Webinar - Using Anti-Evasion to Block Stealth Attacks

This webcast will explain a unique approach to preventing evasive malware from infecting endpoints.

Watch >>
Video
VIDEO
Integrating Minerva Anti-Evasion Platform with McAfee

Watch a demo of how Minerva Labs Anti-Evasion Platform boosts your endpoint security when integrated with McAfee and enhances your investment

Watch >>
Case Study
USE CASE
Minerva for Critical Infrastructure

Malicious attacks on industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA) environments are on the rise.

Download >>
Whitepaper
WHITEPAPER
Making Sense of Endpoint Security

For security architects, endpoint security can be a confusing space. We will make sense of the options available to organizations seeking to improve their endpoint security.

Download >>
Video
VIDEO
Eddy Bobritsky’s interview with SecurityGuyTV at #SANS Network Security, Las Vegas

Check out Eddy Bobritsky’s interview with huck Harold of SecurityGuyTV about Minerva's Anti-Evasion platform and the NEW Malware vaccination module

Watch >>
Whitepaper
WHITEPAPER
The Past, Present & Future of Endpoint Malware Vaccination

Read this whitepaper and get a brief history of endpoint malware vaccination and how incident response teams can immunize endpoints in moments to contain outbreaks.

Download >>
Webinar
WEBINAR
Safeguarding Endpoints with Vaccination

Learn more about how to immunize endpoints in moments by simulating infection markers across all enterprise endpoints.

Watch >>
Brochure
BROCHURE
Endpoint Malware Vaccination

Prevent outbreaks & contain threats by simulating infection markers on endpoints

Download >
Case Study
CUSTOMER STORY
ECI Relies on Minerva’s Innovative Malware Prevention Solution

ECI’s internal cyber security program has to be exemplary to ensure no internal breaches.

Download >>
Brochure
BROCHURE
Ransomware Protection for Apple macOS

Adversaries have recognized that Apple macOS systems present a new lucrative market and revenue stream.

Download >>
Video
VIDEO
Preventing the Exploitation of Outlook Forms

Fileless attacks are on the rise. See how one of the latest attacks is prevented where detection tools failed.

Watch >>
Webinar
WEBINAR
How to Beat Evasive Malware at Its Own Game

Learn more about how to turn malware strengths into weaknesses by using a deception approach on endpoints.

Watch >>
Video
VIDEO
Stop NotPetya with a prevention-first approach

In June 2017, a new variant of ransomware, now dubbed NotPetya, was used for a global cyber-attack. Minerva's Anti-Evasion Platform blocks NotPetya's malicio...

Watch>>
Brochure
BROCHURE
Ransomware Protection

Learn how to stop time on ransomware and avoid paying the ransom.

Download >>
Brochure
BROCHURE
Anti-Evasion Platform

Block unknown threats that are designed to evade your existing defenses

Download >>
Video
VIDEO
Eddy Bobritsky’s interview with Paul Asadoorian of Security Weekly

Check out Eddy Bobritsky’s interview with Paul Asadoorian of Security Weekly about where people should focus their efforts in endpoint threat protection, detection and reaction.

Watch >>
Webinar
WEBINAR
Evasive malware is everywhere

Learn more about evasive malware in our webinar co-hosted with SANS Institute.

Watch >>
Video
VIDEO
Cybox Cybertech 2016

Eddy Bobritsky, Minerva Labs CEO, presents Minerva Labs' solution at the Cybertech 2016 Cybox contest.

Watch >>
Video
VIDEO
Demo #3 - IronGate

A demonstration of IronGate, a SCADA targeted malware.

Watch >>
Video
VIDEO
Demo #1 - Packed Petya

A demonstration of the Petya ransomware combined with a common packing technology.

Watch >>
Video
VIDEO
Demo #2 - Evasive Ransomware

Here we demonstrate of the Locky ransomware using evasive techniques

Watch >>
Video
VIDEO
Ransomware - A Threat Prevented

Comparison and demonstration of two environments

Watch >>
Video
VIDEO
Minerva Intro

Minerva give the CISO a peace of mind by preventing cyber-attacks without the need for prior detection.

Watch >>
Whitepaper
WHITEPAPER
Introduction to Evasive Techniques

Evasion techniques are a set of malware capabilities that evolved as a result of the need to avoid execution within a hostile environment.

Download >>
Brochure
BROCHURE
Memory Injection Prevention

Minerva offers a unique solution that prevents and mitigates memory injection attacks

Download >>
Research
RESEARCH
Minerva’s 2016 Year in Review

This paper will go through the prominent cases the team observed during 2016 providing a wider perspective to the reader.

Download >>

Stop the cyber security race