• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

SonicWall Reveals New Defense Against Zero-Days

Used for months by the vendor’s Capture Cloud threat intelligence service, the previously secret deep memory inspection technology has already identified hundreds of malware variants sandboxing systems missed, and offers protection from the Meltdown vulnerability.

February 19, 2018 TechDecisions Staff Leave a Comment

SonicWall Inc. has parted the curtains on a previously secret real-time threat detection technology that’s been running for months in its Capture Cloud threat intelligence service.

Called SonicWall Capture Cloud Real-Time Deep Memory Inspection (RTDMI), the new system has quietly helped Milpitas, Calif.-based SonicWall identify hundreds of malware variants invisible to conventional sandboxing systems.

The new technology also offers protection against Meltdown, the vulnerability in Intel x86 processors and some ARM-based CPUs first exposed by Google’s Project Zero security team last month, according to SonicWall CTO John Gmuender.

“SonicWall currently expects the RTDMI technology to be effective against future exploits that are based on the Meltdown vulnerability,” Gmuender said in emailed remarks to ChannelPro.

Malware writers have developed a variety of ways to conceal malicious payloads from today’s increasingly sophisticated security defenses, including custom encryption schemes. Those techniques often expose a virus’s most dangerous weapons too briefly for most detection systems to analyze, and are smart enough in some cases to hide those weapons entirely when run inside a sandbox.

According to Gmuender, however, RTDMI’s patent-pending technology compels malware that exhibits no malicious behavior to unveil its concealed weaponry, even if that code is encrypted and visible for intervals less than 100 nanoseconds.

“RTDMI controls the execution of the malware, and forces the malware to execute the code paths that reveal its malicious nature,” he says.

The result, according to SonicWall, is proactive, real-time protection against zero-day exploits and previously unknown threats.

Gmuender contrasts RTDMI with endpoint detection and response (EDR) products from vendors like SentinelOne, of Mountain View, Calif. Those systems, he says, rely on agents running directly on protected endpoints. RTDMI, on the other hand, intercepts malware before EDR systems even have a chance to assess it.

“Potentially malicious content is executed by the RTDMI engine technology within the SonicWall Capture Cloud, and the solution blocks that content from reaching clients and servers until a verdict is rendered, thus preventing malicious payloads from reaching endpoints,” Gmuender says.

SonicWall’s entire family of firewalls, wireless network security systems, email security solutions, and other offerings draw on Capture Cloud threat intelligence, and by extension RTDMI.

The new technology was developed by researchers and engineers in SonicWall’s Capture Labs unit, who have been working on it since 2016. It is one of multiple threat detection engines utilized by Capture Cloud.

Gmuender declines to specify whether RTDMI will protect against Spectre, a second critical vulnerability exposed last month by Google researchers that affects chips from Intel, AMD, and ARM. Experts generally consider Spectre a bigger threat, and harder one to block, than Meltdown.

“SonicWall’s Capture Labs threat researchers are actively analyzing various Spectre vulnerabilities,” Gmuender says.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Attacks, Cyber Security, Products

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.