Technologies for protecting systems and data to prevent cyber-attacks

ABSTRACT

Technologies for protecting systems and data of an organization from malware include a data integrity server configured to receive a data file for import from an external source. The data integrity server analyzes the received data file with multiple anti-malware engines to determine whether the data file includes hidden malware. The data integrity server discards the data file in response to a determination that the data file includes hidden malware. Additionally, the data integrity server verifies the type of the received data file based on the file extension associated with the received data file. The data integrity server cleans the received data file in response to verification of the file type. The cleaned data file is transmitted to a computing device to be imported. Other embodiments are described and claimed.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. application Ser. No.14/600,672, entitled “TECHNOLOGIES FOR PROTECTING SYSTEMS AND DATA TOPREVENT CYBER-ATTACKS,” filed Jan. 20, 2015, which claims the benefit ofU.S. Provisional Application No. 61/929,576, entitled “CYBER-SECURITYSYSTEMS AND METHODS,” filed Jan. 21, 2014, each of which is herebyincorporated herein by reference in its entirety.

TECHNICAL FIELD

Embodiments of the technologies described herein relate, in general, tocybersecurity technologies, and in particular to an electronic platformfor protecting a network from malware hidden within files imported intoor exported from the network.

BACKGROUND

Organizations rely heavily upon their Information Technology (IT)systems and, in particular, the security of the IT systems. One keyfeature of such systems involves the transfer of files from theorganization (export) and to the organization (import). Such files maycontain all types of digital data including text, images, video, audio,and the like that may be required by the organization. The importance ofsuch transfers has made them a frequent target for attack by hackers,often with disastrous results for the organization involved. Hackers usethe platform of these files in order to infect the IT systems of theorganization with malicious code and/or to extract sensitive data fromthe organization. Malicious code is generally hidden within the filesand current security tools like antivirus software are incapable ofdetecting or preventing such attacks. Antivirus programs and other toolsmay be effective when responding to discovered and known attacks orviruses, but such programs are poorly suited for detecting maliciouscode within file platforms. In such platforms, antivirus programs may bealerted only after significant damage has already been done.Additionally, there is typically a gap between the time in which a newthreat is identified and the time in which the antivirus programs areupdated to protect against the new threat.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure will be more readily understood from a detaileddescription of some example embodiments taken in conjunction with thefollowing figures in which:

FIG. 1 is a simplified block diagram of at least one embodiment of asystem for protecting systems and data of an organization from malware;

FIG. 2 is a simplified block diagram of at least one embodiment of anenvironment that may be executed by the data integrity server of FIG. 1;

FIG. 3 is a simplified flow diagram of at least one embodiment of amethod for protecting systems and data of an organization from malwarethat may be executed by the data integrity server of FIGS. 1 and 2; and

FIG. 4 is a simplified flow diagram of at least one embodiment of amethod for analyzing a batch of files for malware that may be executedby the data integrity server of FIGS. 1 and 2.

SUMMARY

A data integrity server for protecting systems and data includes amalware detection module configured to receive a data file for importfrom an external source, analyze the received data file with a pluralityof anti-malware engines, determine whether the received data fileincludes malware based on the analysis, and discard the received datafile in response to a determination that the received file includesmalware. The data integrity server further includes a file typeverification module configured to verify, in response to a determinationthat the received file does not include malware, the file type of thereceived data file based at least in part on the file extensionassociated with the received data file. Additionally, the data integrityserver also includes a file sterilization module configured to clean thereceived data file in response to a verification of the file type of thereceived data file and transmit the cleaned data file to a computingdevice for import of the cleaned data file.

In an embodiment, to clean the received data file includes to transformthe received file as a function of a file type-specific rule, whereinthe file type-specific rule maintains a file format of the received datafile and renders malware hidden within the received data file benign. Insuch an embodiment, the file type-specific rule may further modify acharacteristic of the received data file. The characteristic of thereceived data file may include a structure, a format, or headerinformation corresponding to the received data file.

In an embodiment, the malware detection module is further configured todetermine whether the received data file can be cleaned in response to adetermination that the received file includes malware. In such anembodiment, to discard the received data file in response to adetermination that the received file includes malware includes todiscard the received data file in response to a determination that thereceived data file cannot be cleaned. Additionally, the file typeverification module may further be configured to verify, in response toa determination that the received data file can be cleaned, the filetype of the received data file based at least in part on the fileextension associated with the received data file.

In another embodiment, to receive the data file for import from theexternal source includes to one of receive an email message thatincludes the data file for import as an attachment, receive the datafile for import from an agent of a local computing device, receive thedata file for import from a physical storage media, receive the datafile for import as a download from a website, receive the data file forimport from a storage cloud, receive the data file for import from avirtual safe, or receive the data file for import from a file transferprotocol session. Additionally, the external source may include one ofan email server, a local upload device, a local computing device, a webserver, a file transfer protocol server, a cloud storage server, or avirtual safe server. Additionally, in an embodiment, to verify the filetype of the received data file based at least in part on the fileextension associated with the received data file includes to process thereceived file in a sandbox and monitor the behavior of the received datafile during processing.

In another embodiment, to receive the data file for import from theexternal source includes to receive a batch of data files for importfrom the external source, to analyze the received data file with theplurality of anti-malware engines includes to analyze each data file ofthe batch of data files with a plurality of anti-malware engines, and todetermine whether the received data file includes malware includes todetermine whether each data file of the batch includes malware based onthe analysis. In an embodiment, to discard the received data fileincludes to discard each data file of the batch in response to adetermination that one or more of the data files of the batch includesmalware. In another embodiment, to discard the received data fileincludes to discard each data file in the batch determined to includemalware. Additionally, in another embodiment, to discard the receiveddata file includes to determine whether each data file in the batchdetermined to include malware can be cleaned and discard each data fileof the batch in response to a determination that one or more of the datafiles determined to include malware cannot be cleaned.

One or more machine-readable storage media include a plurality ofinstructions stored thereon that in response to being executed by a dataintegrity server, cause the data integrity server to receive a data filefor import from an external source, analyze the received data file witha plurality of anti-malware engines, determine whether the received datafile includes malware based on the analysis, and discard the receiveddata file in response to a determination that the received file includesmalware. The plurality of instructions further cause the data integrityserver to verify, in response to a determination that the received filedoes not include malware, the file type of the received data file basedat least in part on the file extension associated with the received datafile and clean the received data file in response to a verification ofthe file type of the received data file. Additionally, the plurality ofinstructions further cause the data integrity server to transmit thecleaned data file to a computing device for import of the cleaned datafile.

In an embodiment, to clean the received data file includes to transformthe received file as a function of a file type-specific rule, whereinthe file type-specific rule maintains a file format of the received datafile and renders malware hidden within the received data file benign. Insuch an embodiment, the file type-specific rule may further modify acharacteristic of the received data file.

Additionally, in an embodiment, the plurality of instructions mayfurther cause the data integrity server to determine whether thereceived data file can be cleaned in response to a determination thatthe received file includes malware. In such an embodiment, to discardthe received data file in response to a determination that the receivedfile includes malware includes to discard the received data file inresponse to a determination that the received data file cannot becleaned. In another embodiment, to verify the file type of the receiveddata file based at least in part on the file extension associated withthe received data file includes to process the received file in asandbox and monitor the behavior of the received data file duringprocessing.

A method for protecting systems and data includes receiving, by a dataintegrity server, a data file for import from an external source. Themethod further includes analyzing, by the data integrity server, thereceived data file with a plurality of anti-malware engines anddetermining, by the data integrity server, whether the received datafile includes malware based on the analysis. Additionally, the methodincludes discarding, by the data integrity server, the received datafile in response to determining that the received file includes malware.The method further includes verifying, by the data integrity server andin response to determining that the received file does not includemalware, the file type of the received data file based at least in parton the file extension associated with the received data file.Additionally, the method further includes cleaning, by the dataintegrity server, the received data file in response to verifying thefile type of the received data file and transmitting, by the dataintegrity server, the cleaned data file to a computing device for importof the cleaned data file.

In an embodiment, cleaning the received data file includes transformingthe received file as a function of a file type-specific rule, whereinthe file type-specific rule maintains a file format of the received datafile and renders malware hidden within the received data file benign. Insuch an embodiment, the file type-specific rule may further modify acharacteristic of the received data file. In another embodiment,verifying the file type of the received data file based at least in parton the file extension associated with the received data file includesprocessing the received file in a sandbox and monitoring the behavior ofthe received data file during processing.

DETAILED DESCRIPTION

Various non-limiting embodiments of the present disclosure will now bedescribed to provide an overall understanding of the principles of thestructure, function, and use of systems and methods disclosed herein.One or more examples of these non-limiting embodiments are illustratedin the selected examples disclosed and described in detail withreference made to FIGS. 1-4 in the accompanying drawings. Those ofordinary skill in the art will understand that systems and methodsspecifically described herein and illustrated in the accompanyingdrawings are non-limiting embodiments. The features illustrated ordescribed in connection with one non-limiting embodiment may be combinedwith the features of other non-limiting embodiments. Such modificationsand variations are intended to be included within the scope of thepresent disclosure.

The systems, apparatuses, devices, and methods disclosed herein aredescribed in detail by way of examples and with reference to thefigures. The examples discussed herein are examples only and areprovided to assist in the explanation of the apparatuses, devices,systems and methods described herein. None of the features or componentsshown in the drawings or discussed below should be taken as mandatoryfor any specific implementation of any of these the apparatuses,devices, systems or methods unless specifically designated as mandatory.In addition, elements illustrated in the figures are not necessarilydrawn to scale for simplicity and clarity of illustration. For ease ofreading and clarity, certain components, modules, or methods may bedescribed solely in connection with a specific figure. In thisdisclosure, any identification of specific techniques, arrangements,etc. are either related to a specific example presented or are merely ageneral description of such a technique, arrangement, etc.Identifications of specific details or examples are not intended to be,and should not be, construed as mandatory or limiting unlessspecifically designated as such. Any failure to specifically describe acombination or sub-combination of components should not be understood asan indication that any combination or sub-combination is not possible.It will be appreciated that modifications to disclosed and describedexamples, arrangements, configurations, components, elements,apparatuses, devices, systems, methods, etc. can be made and may bedesired for a specific application. Also, for any methods described,regardless of whether the method is described in conjunction with a flowdiagram, it should be understood that unless otherwise specified orrequired by context, any explicit or implicit ordering of stepsperformed in the execution of a method does not imply that those stepsmust be performed in the order presented but instead may be performed ina different order or in parallel.

Reference throughout the specification to “various embodiments,” “someembodiments,” “one embodiment,” “some example embodiments,” “one exampleembodiment,” or “an embodiment” means that a particular feature,structure, or characteristic described in connection with any embodimentis included in at least one embodiment. Thus, appearances of the phrases“in various embodiments,” “in some embodiments,” “in one embodiment,”“some example embodiments,” “one example embodiment, or “in anembodiment” in places throughout the specification are not necessarilyall referring to the same embodiment. Furthermore, the particularfeatures, structures or characteristics may be combined in any suitablemanner in one or more embodiments.

Throughout this disclosure, references to components or modulesgenerally refer to items that logically can be grouped together toperform a function or group of related functions. Like referencenumerals are generally intended to refer to the same or similarcomponents. Components and modules can be implemented in software,hardware, or a combination of software and hardware. The term “software”is used expansively to include not only executable code, for examplemachine-executable or machine-interpretable instructions, but also datastructures, data stores and computing instructions stored in anysuitable electronic format, including firmware, and embedded software.The terms “information” and “data” are used expansively and includes awide variety of electronic information, including executable code;content such as text, video data, and audio data, among others; andvarious codes or flags. The terms “information,” “data,” and “content”are sometimes used interchangeably when permitted by context. It shouldbe noted that although for clarity and to aid in understanding someexamples discussed herein might describe specific features or functionsas part of a specific component or module, or as occurring at a specificlayer of a computing device (for example, a hardware layer, operatingsystem layer, or application layer), those features or functions may beimplemented as part of a different component or module or operated at adifferent layer of a communication protocol stack. Those of ordinaryskill in the art will recognize that the systems, apparatuses, devices,and methods described herein can be applied to, or easily modified foruse with, other types of equipment, can use other arrangements ofcomputing systems such as client-server distributed systems, and can useother protocols, or operate at other layers in communication protocolstacks, than are described.

Referring now to FIG. 1, in one embodiment, a system 100 for protectingan organization's systems and data from malware includes a dataintegrity server 102 configured to communicate with an email server 120,a local upload device 130, a local computing device 140, a web server150, a File Transfer Protocol (FTP) server 160, a cloud storage server170, and a virtual safe server 180 over one or more networks 190. Itshould be appreciated that although the data integrity server 102 of theillustrative embodiment protects an organization's systems and data frommalware, the data integrity server 102 may also protect any otherentity's systems and data from malware. For example, in someembodiments, the data integrity server 102 may also be configured toprotect an individual user's or a homeowner's systems and data frommalware.

In operation, the data integrity server 102 eliminates various types ofmalicious code or malware (e.g., viruses, spyware, adware, nagware,worms, Trojans, etc.) hidden inside of data files being imported intoand exported from an organization's systems or networks. The dataintegrity server 102 eliminates previously known types of malware aswell as types of malware that have not yet been identified bycybersecurity professionals. To do so, the data integrity server 102receives or intercepts data files (or information) prior to such datafiles being permitted to be imported into or exported from anorganization's systems or network(s) 190. Subsequently, the dataintegrity server 102 analyzes the data file with multiple anti-malwareengines to determine whether the data file includes any known hiddenmalware. The data integrity server 102 may discard or take otherpreventative actions in response to one or more of the anti-malwareengines determining that the data file includes a known type of hiddenmalware. Additionally, in response to one or more of the anti-malwareengines determining that the data file does not include a known type ofhidden malware, the data integrity server 102 verifies the type of thedata file based at least in part on, or otherwise as a function of, theextension of the data file. To do so, in some embodiments, the dataintegrity server 102 processes or otherwise executes the data file in asandbox (or other virtual environment) and monitors for suspiciousbehavior. If the data integrity server 102 is unable to verify the typeof the data file based on the extension, the data integrity server 102may discard or take other preventative actions. In embodiments in whichthe data integrity server 102 is able to verify the type of the datafile based on the extension, the data integrity server 102 may sanitizeor clean the data file to eliminate any unknown or hidden malware. To doso, in some embodiments, the data integrity server 102 transforms and/orreformats the data file according to one or more file type-specificrules to render any unknown or hidden malware inoperable or benign.After cleaning the data file, the data integrity server 102 transmitsthe data file to the originally intended destination (e.g., a local fileserver, a workstation computing device, a local or remote email server,a local or remote web server, etc.), which may be located internally orexternally to the organization. In that way, both known and unknownmalware threats embedded within data files may be detected and/oreliminated prior to such data files being introduced into or exportedfrom an organization's systems or network(s) 190.

The data integrity server 102 may be embodied as any type of server orcomputing device capable of processing, communicating, storing,maintaining, and transferring data. For example, the data integrityserver 102 may be embodied as a server, a microcomputer, a minicomputer,a mainframe, a desktop computer, a laptop computer, a mobile computingdevice, a handheld computer, a smart phone, a tablet computer, apersonal digital assistant, a telephony device, a custom chip, anembedded processing device, or other computing device and/or suitableprogrammable device. In some embodiments, the data integrity server 102may be embodied as a computing device integrated with other systems orsubsystems. In the illustrative embodiment of FIG. 1, the data integrityserver 102 includes a processor 104, a system bus 106, a memory 108, adata storage 110, communication circuitry 114, and one or moreperipheral devices 116. Of course, the data integrity server 102 mayinclude other or additional components, such as those commonly found ina server and/or computer (e.g., various input/output devices), in otherembodiments. Additionally, in some embodiments, one or more of theillustrative components may be incorporated in, or otherwise from aportion of, another component. For example, the memory 108, or portionsthereof, may be incorporated in the processor 104 in some embodiments.Furthermore, it should be appreciated that the data integrity server 102may include other components, sub-components, and devices commonly foundin a computer and/or computing device, which are not illustrated in FIG.1 for clarity of the description.

The processor 104 may be embodied as any type of processor capable ofperforming the functions described herein. For example, the processor104 may be embodied as a single or multi-core processor, a digitalsignal processor, microcontroller, a general purpose central processingunit (CPU), a reduced instruction set computer (RISC) processor, aprocessor having a pipeline, a complex instruction set computer (CISC)processor, an application specific integrated circuit (ASIC), aprogrammable logic device (PLD), a field programmable gate array (FPGA),or other processor or processing/controlling circuit or controller.

In various configurations, the data integrity server 102 includes asystem bus 106 for interconnecting the various components of the dataintegrity server 102. The system bus 106 may be embodied as, orotherwise include, memory controller hubs, input/output control hubs,firmware devices, communication links (i.e., point-to-point links, buslinks, wires, cables, light guides, printed circuit board traces, etc.)and/or other components and subsystems to facilitate the input/outputoperations with the processor 104, the memory 108, and other componentsof the data integrity server 102. In some embodiments, the dataintegrity server 102 can be integrated into one or more chips such as aprogrammable logic device or an application specific integrated circuit(ASIC). In such embodiments, the system bus 106 may form a portion of asystem-on-a-chip (SoC) and be incorporated, along with the processor104, the memory 108, and other components of the data integrity server102, on a single integrated circuit chip.

The memory 108 may be embodied as any type of volatile or non-volatilememory or data storage capable of performing the functions describedherein. For example, the memory 108 may be embodied as read only memory(ROM), random access memory (RAM), cache memory associated with theprocessor 104, or other memories such as dynamic RAM (DRAM), static ram(SRAM), programmable ROM (PROM), electrically erasable PROM (EEPROM),flash memory, a removable memory card or disk, a solid state drive, andso forth. In operation, the memory 108 may store various data andsoftware used during operation of the data integrity server 102 such asoperating systems, applications, programs, libraries, and drivers.

The data storage 110 may be embodied as any type of device or devicesconfigured for short-term or long-term storage of data such as, forexample, memory devices and circuits, memory cards, hard disk drives,solid-state drives, or other data storage devices. For example, in someembodiments, the data storage 110 includes storage media such as astorage device that can be configured to have multiple modules, such asmagnetic disk drives, floppy drives, tape drives, hard drives, opticaldrives and media, magneto-optical drives and media, compact disk drives,Compact Disc Read Only Memory (CD-ROM), Compact Disc Recordable (CD-R),Compact Disc Rewriteable (CD-RW), a suitable type of Digital VersatileDisc (DVD) or Blu-Ray disk, and so forth. Storage media such as flashdrives, solid state hard drives, redundant array of individual disks(RAID), virtual drives, networked drives and other memory meansincluding storage media on the processor 104, or the memory 108 are alsocontemplated as storage devices. It should be appreciated that suchmemory can be internal or external with respect to operation of thedisclosed embodiments. It should also be appreciated that certainportions of the processes described herein can be performed usinginstructions stored on a computer-readable medium or media that director otherwise instruct a computer system to perform the process steps.Non-transitory computer-readable media, as used herein, comprises allcomputer-readable media except for transitory, propagating signals.

In some embodiments, the data storage 110 includes file type-specificrules 112. Each of the file type-specific rules 112 may correspond to aspecific file type and may be configured to transform and/or reformatdata files of the same file type. In some embodiments, one or more ofthe file type-specific rules 112 may be configured to transform and/orreformat received data files of the same file type without changingcritical underlying features of the received data files. To do so, oneor more of the file type-specific rules 112 may be configured to changeor modify a characteristic (e.g., structure, format, header information,etc.) of a received data file in such a way that malicious code hiddenwithin the data file is rendered benign but the original file format isretained and minimal degradation of the quality of the data file occurs.In a specific example, one or more of the file type-specific rules 112may be configured to modify an image characteristic (e.g., an image sizeor resolution, a file size, a level of quality, a type of encoding,etc.) of a received image and thereby generate a new image of the sametype and being substantially similar in quality when rendered orprocessed.

In another specific example, one or more of the file type-specific rules112 may be configured to convert each page (or a portion thereof) of aportable document format (PDF) into an image and then modify acharacteristic of the image such that a new image is generated beingsubstantially similar in quality when rendered or processed. In yetanother specific example, one or more of the file type-specific rules112 may be configured to modify a characteristic corresponding to eachembedded object of a multi-object document in series or in parallel. Forexample, the one or more file type-specific rules 112 may be configuredto modify an image characteristic of an image included with a document,a text characteristic of a text block included within the document, anaudio characteristic of an audio clip included within the document, anda video characteristic of a video clip included within the document. Insuch examples, the file type-specific rules 112 may be configured toreconstruct the document and thereby eliminate any malware hiddentherein. It should be appreciated that the file type-specific rules 112may be configured to transform and/or reformat any type of file (orembedded object) by modifying any suitable characteristic. Additionally,in some embodiments, one or more of the file type-specific rules 112 maybe embodied as mathematical algorithms configured to transform and/orreformat received data files (or objects embedded within received datafiles).

The communication circuitry 114 of the data integrity server 102 may beembodied as any type of communication circuit, device, interface, orcollection thereof, capable of enabling communications between the dataintegrity server 102 and the email server 120, local upload device 130,local computing device 140, web server 150, FTP server 160, cloudstorage server 170, virtual safe server 180, and/or other computingdevices. For example, the communication circuitry 114 may be embodied asone or more network interface controllers (NICs), in some embodiments.The communication circuitry 114 may be configured to use any one or morecommunication technologies (e.g., wireless or wired communications) andassociated protocols (e.g., Ethernet, Wi-Fi®, WiMAX, etc.) to effectsuch communication.

In some embodiments, the data integrity server 102 and the email server120, local upload device 130, local computing device 140, web server150, FTP server 160, cloud storage server 170, virtual safe server 180,and/or other computing devices may communicate with each other over thenetwork(s) 190. The network(s) 190 may be embodied as any number ofvarious wired and/or wireless communication networks. For example, thenetwork(s) 190 may be embodied as or otherwise include a local areanetwork (LAN), a wide area network (WAN), a cellular network, or apublicly-accessible, global network such as the Internet. Additionally,the network(s) 190 may include any number of additional devices tofacilitate communication between the data integrity server 102, emailserver 120, local upload device 130, local computing device 140, webserver 150, FTP server 160, cloud storage server 170, virtual safeserver 180, and/or other computing devices.

Additionally, in some embodiments, the data integrity server 102 mayfurther include one or more peripheral devices 116. Such peripheraldevices 116 may include any type of peripheral device commonly found ina computing device such as additional data storage, speakers, a hardwarekeyboard, a keypad, a gesture or graphical input device, a motion inputdevice, a touchscreen interface, one or more displays, an audio unit, avoice recognition unit, a vibratory device, a computer mouse, aperipheral communication device, and any other suitable user interface,input/output device, and/or other peripheral device.

The email server 120 may be embodied as any type of computing devicecapable of performing the functions described herein. For example, theemail server 120 may be embodied as a server, a microcomputer, aminicomputer, a mainframe, a desktop computer, a laptop computer, acustom chip, an embedded processing device, or other computing deviceand/or suitable programmable device. As such, the email server 120 mayinclude devices and structures commonly found in a computing device suchas processors, memory devices, communication circuitry, and datastorages, which are not shown in FIG. 1 for clarity of the description.In some embodiments, the email server 120 may be local to theorganization (e.g., communicatively coupled to the network(s) 190 of theorganization and/or administered by the organization). Additionally oralternatively, the email server 120 may be remote to the organization(e.g., communicatively coupled to the Internet, administered by anentity external to the organization, etc.). In some embodiments, theemail server 120 is configured to send and receive email messages to andfrom users, both internal and external to the organization. Additionallyor alternatively, the email server 120 may be configured to relay emailmessages on behalf of users or other entities.

In the illustrative embodiment, the email server 120 is configured tointercept and transmit email messages and attachments (e.g., data filesand other electronic information) to the data integrity server 102 priorto delivery to an intended recipient. As discussed in more detail below,the data integrity server 102 analyzes and sanitizes (e.g., cleans) theemail messages and attachments. After analysis and sanitization by thedata integrity server 102, the email server 120 is configured totransmit, relay, and/or deliver the email messages and attachments tothe intended recipient, which may be internal or external to theorganization. Additionally or alternatively, in some embodiments, theemail server 120 may be configured to operate as a mail relay server. Insuch embodiments, the email server 120 may be configured to interceptand transmit email messages and attachments (e.g., data files and otherelectronic information) to the data integrity server 102, which maysubsequently transmit the analyzed and sanitized email messages toanother email server 120 for transmission and/or delivery to theintended recipient. In this manner, the organization can control theimport of email messages and attachments (e.g., data files) that maycontain malware.

The local upload device 130 may be embodied as any type of computingdevice capable of performing the functions described herein. Forexample, the local upload device 130 may be embodied as a server, akiosk, a workstation, a microcomputer, a minicomputer, a mainframe, adesktop computer, a laptop computer, a mobile computing device, ahandheld computer, a smart phone, a tablet computer, a personal digitalassistant, a telephony device, a custom chip, an embedded processingdevice, or other computing device and/or suitable programmable device.As such, the local upload device 130 may include devices and structurescommonly found in a computing device such as processors, memory devices,communication circuitry, and data storages, which are not shown in FIG.1 for clarity of the description. In the illustrative embodiment, thelocal upload device 130 is configured to protect organizations from datafiles entering through physical storage media 132 or memory devices suchas, for example, compact discs (CDs), digital versatile discs (DVDs),memory sticks, portable hard drives, and other such devices anddetachable storage media. In some embodiments, an organization mayrequire employees to utilize the local upload device 130 to import anydata files originating from a physical storage media 132 or memorydevice into the organization's systems and network(s) 190. In suchembodiments, the local upload device 130 may be configured to interceptdata files prior to those data files being introduced into theorganization's systems and network(s) 190. Intercepted data files may besent to the data integrity server 102 to be processed as discussed inmore detail below. In this manner, the organization can control theimport of data files from physical storage media 132 or a memory devicethat may contain malware.

In some embodiments, the local upload device 130 may be embodied as ahardened computing system to prevent users (e.g., employees, maliciousactors, etc.) from circumventing the data file import mechanismsdescribed above. For example, in some embodiments, the functionality ofthe local upload device 130 may be managed by an operating system orsystem image executed from a bootable CD or DVD. It should beappreciated that the operating system and/or system image may beexecuted from any other bootable type of read-only memory or storagedevice.

The local computing device 140 may be embodied as any type of computingdevice capable of performing the functions described herein. Forexample, the local computing device 140 may be embodied as aworkstation, a desktop computer, a laptop computer, a mobile computingdevice, a handheld computer, a smart phone, a tablet computer, apersonal digital assistant, a telephony device, a microcomputer, aminicomputer, a server, a kiosk, a mainframe, a custom chip, an embeddedprocessing device, or other computing device and/or suitableprogrammable device. As such, the local computing device 140 may includedevices and structures commonly found in a computing device such asprocessors, memory devices, communication circuitry, and data storages,which are not shown in FIG. 1 for clarity of the description. In someembodiments, the local computing device 140 may execute a securityagent. The security agent may be configured to prevent users (e.g.,employees, etc.) from importing data files via physical memory devices132 or storage media (e.g., CDs, DVDs, memory sticks, portable harddrives, detachable storage media, etc.) inserted into an optical driveor communicatively coupled to a communication interface (e.g., a USBinterface, an eSATA interface, a PCIe interface, etc.) of the localcomputing device 140. Alternatively, the security agent may beconfigured to intercept data files exported via physical memory devices132 or storage media inserted into an optical drive or communicativelycoupled to a communication interface of the local computing device 140.The security agent may send the intercepted data files to the dataintegrity server 102 to be processed. In this manner, the organizationcan also control the import and export of data files to/from a physicaldevice or storage media inserted into and/or communicatively coupled tothe local computing device 140.

The web server 150 may be embodied as any type of computing devicecapable of performing the functions described herein. For example, theweb server 150 may be embodied as a server, a microcomputer, aminicomputer, a mainframe, a desktop computer, a laptop computer, acustom chip, an embedded processing device, or other computing deviceand/or suitable programmable device. As such, the web server 150 mayinclude devices and structures commonly found in a computing device suchas processors, memory devices, communication circuitry, and datastorages, which are not shown in FIG. 1 for clarity of the description.The web server 150 may be local to the organization or it may be remoteto the organization. In the illustrative embodiment, the web server 150is configured to protect against malware associated with websites or theinternet. In some embodiments, the web server 150 is configured tointercept data files attempting to enter the organization's systems ornetwork(s) 190 through a website, the Internet, an extranet, and/or anyother network, system, or electronic source. For example, the web server150 may be configured to intercept a data file attempting to bedownloaded by an employee of the organization. In such embodiments, theweb server 150 transmits the intercepted data files to the dataintegrity server 102 for processing as discussed in more detailed below.After the data file has been processed by the data integrity server 102,it may be permitted to be imported into one or more systems ornetwork(s) 190 of the organization. In this manner, the organization cancontrol the import (or export) of data files downloaded (or uploaded)via a remote website.

The File Transfer Protocol (FTP) server 160 may be embodied as any typeof computing device capable of performing the functions describedherein. For example, the FTP server 160 may be embodied as a server, amicrocomputer, a minicomputer, a mainframe, a desktop computer, a laptopcomputer, a custom chip, an embedded processing device, or othercomputing device and/or suitable programmable device. As such, the FTPserver 160 may include devices and structures commonly found in acomputing device such as processors, memory devices, communicationcircuitry, and data storages, which are not shown in FIG. 1 for clarityof the description. The FTP server 160 may be local to the organizationor it may be remote to the organization. In the illustrative embodiment,the FTP server 160 is configured to protect against malware associateddata files transferred via FTP connections and/or sessions. In someembodiments, the FTP server 160 is configured to intercept data filesattempting to enter the organization's systems or network(s) 190 throughan FTP connection or session. For example, the FTP server 160 may beconfigured to intercept a data file attempting to be downloaded by anemployee of the organization via an FTP connection with a remote system.In such embodiments, the FTP server 160 transmits the intercepted datafiles to the data integrity server 102 for processing as discussed inmore detailed below. After the data file has been processed by the dataintegrity server 102, it may be permitted to be imported into one ormore systems or network(s) 190 of the organization. In this manner, theorganization can control the import (or export) of data files downloaded(or uploaded) via FTP connections and/or sessions.

The cloud storage server 170 may be embodied as any type of computingdevice capable of performing the functions described herein. Forexample, the cloud storage server 170 may be embodied as a server, amicrocomputer, a minicomputer, a mainframe, a desktop computer, a laptopcomputer, a custom chip, an embedded processing device, or othercomputing device and/or suitable programmable device. As such, the cloudstorage server 170 may include devices and structures commonly found ina computing device such as processors, memory devices, communicationcircuitry, and data storages, which are not shown in FIG. 1 for clarityof the description. The cloud storage server 170 may include datastorage (e.g., a single data storage, multiple data storages, or avirtualized pool of data storage) to which data files (e.g., digitaldocuments, digital videos, digital photographs, digital music, systembackups, virtual machine images, etc.) of a user may be stored and lateraccessed. In the illustrative embodiment, data files downloaded from oruploaded to the cloud storage server 170 may be intercepted andprocessed by the data integrity server 102. After the data files havebeen processed by the data integrity server 102, they may be permittedto be imported into or exported from one or more systems or network(s)190 of the organization. In this way, the organization can control theimport (or export) of data files downloaded (or uploaded) via the cloudstorage server 170.

The virtual safe server 180 may be embodied as any type of computingdevice capable of performing the functions described herein. Forexample, the virtual safe server 180 may be embodied as a server, amicrocomputer, a minicomputer, a mainframe, a desktop computer, a laptopcomputer, a custom chip, an embedded processing device, or othercomputing device and/or suitable programmable device. As such, thevirtual safe server 180 may include devices and structures commonlyfound in a computing device such as processors, memory devices,communication circuitry, and data storages, which are not shown in FIG.1 for clarity of the description. The virtual safe server 180 may beconfigured to manage one or more virtual safes that facilitate theencrypted and secure transfer of data files both into and out of thesystems or network(s) 190 of the organization. In some embodiments, datafiles that are to be securely transferred from the organization via avirtual safe are intercepted and transmitted to the data integrityserver 102 for processing prior to encryption. In some embodiments, adedicated server (not shown) may be configured to monitor communicationsbetween the systems and network(s) 190 of the organization for files andintercept data files that are to be securely transferred from theorganization via a virtual safe. In other embodiments, one or morevirtual safe agents may be executed by systems or devices (e.g., thelocal computing device 140, the email server 120, the local uploaddevice 130, the web server 150, the FTP server 160, etc.) of theorganization. In such embodiments, the virtual safe agent(s) mayintercept the data files that are to be securely transferred from theorganization via the virtual safe. After the data files have beenprocessed by the data integrity server 102, they may be permitted to beencrypted and securely transferred from the organization via the virtualsafe. In this way, the organization can control the export (or import)of data files securely transferred via virtual safes.

Referring now to FIG. 2, in the illustrative embodiment, the dataintegrity server 102 establishes an environment 200 during operation.The illustrative embodiment 200 includes a malware detection module 202,a file type verification module 204, and a file sterilization module208. In some embodiments, the environment 200 may also include a virtualmachine monitor 210 as discussed in more detail below. Additionally, insome embodiments, the file type verification module 204 may include asandbox management module 206. The various modules of the environment200 may be embodied as hardware, firmware, software, or a combinationthereof. For example, each of the modules of the environment 200 may beembodied as a processor and/or a controller configured to provide thefunctionality described below. Of course, it should be appreciated thatthe data integrity server 102 may include other components,sub-components, modules, and devices commonly found in a computingdevice, which are not illustrated in FIG. 2 for clarity of thedescription.

The malware detection module 202 is configured to analyze data fileswith multiple anti-malware engines to determine whether the data filesinclude any known hidden malware. For example, in some embodiments, themalware detection module 202 may analyze received data files with two ormore, or three or more, anti-malware engines. In a specific embodiment,the malware detection module 202 may analyze received data files withfive different anti-malware engines. Each of the anti-malware enginesmay be embodied as any type of anti-malware or anti-virus engineconfigured to detect various types of malicious code or malware (e.g.,viruses, spyware, adware, nagware, worms, Trojans, etc.) hidden withinthe data file or a batch of data files. In some embodiments, each of theanti-malware engines may be updated periodically to ensure that newlydiscovered malware can be detected. In some embodiments, theanti-malware engines may each notify the malware detection module 202whether malware was detected within the received data files.

In some embodiments, the malware detection module 202 is also configuredto discard or take other preventative action in response to one or moreof the anti-malware engines determining that a received data fileincludes a known type of malware. For example, the malware detectionmodule 202 may discard the infected file in response to one or more ofthe anti-malware engines determining that the data file includes a knowntype of malware (hidden or otherwise). In another example, the malwaredetection module 202 may be configured to determine whether the datafile is able to be cleaned. In some embodiments, the malware detectionmodule 202 may determine whether the infected data file may be cleanedby one or more of the anti-malware engines. In other embodiments, themalware detection module 202 may determine whether it may clean theinfected data file. In embodiments in which the malware detection module202 determines that the infected data file cannot be cleaned, themalware detection module 202 may discard the infected data file.

The file type verification module 204 is configured to verify the typeof a received data file based at least in part on, or otherwise as afunction of, the extension of the file. To do so, the file typeverification module 204 may be configured to verify that thecharacteristics (e.g., structure, format, header information, etc.) ofthe received data file correspond to reference characteristics of a datafile having the same file extension. For example, in embodiments inwhich the received data file is associated with a “.jpg” file extension,the file type verification module 204 may verify that thecharacteristics of the received data file correspond to the anticipatedcharacteristics of an image file having the same file extension. Indoing so, the file type verification module 204 verifies that the datafile is what it claims to be based on the associated file extension. Itshould be appreciated that the file type verification module 204 mayutilize any suitable mechanism for verifying that the actual type of thereceived data file corresponds to the type of data file anticipatedbased on the file extension. In some embodiments, the file typeverification module 204 discards the received data file or takes otherpreventative actions in response to determining that the type of thereceived data file cannot be verified.

Additionally, in some embodiment, the file type verification module 204may also be configured to securely process the received data file tofacilitate verification. To do so, in some embodiments, the file typeverification module 204 includes the sandbox management module 206. Thesandbox management module 206 is configured to execute, open, render,and/or process the received data file in a sandbox (e.g., a virtualenvironment, an isolated environment, etc.). In such embodiments, thesandbox management module 206 may monitor the behavior of the data filewhile it is processed in the sandbox. In some embodiments, the sandboxmanagement module 206 may be configured to monitor for anticipatedbehavior of the data file based on the extension associated with thedata file. Such monitoring may be used by the file type verificationmodule 204 to facilitate verifying the type of the received data filebased on the associated extension. Additionally or alternatively, thesandbox management module 206 may be configured to monitor forsuspicious behavior while the data file is being processed in thesandbox. Such monitoring may be used by the file type verificationmodule 204 to facilitate determining whether the received data fileincludes malware.

The file sterilization module 208 is configured to sterilize or cleandata files to eliminate any unknown or hidden malware. To do so, in someembodiments, the file sterilization module 208 transforms and/orreformats the data file based on one or more file type-specific rules112 in such a way that malicious code hidden within the data file isrendered benign but the original file format is retained and minimaldegradation of the quality of the data file occurs. As discussed, insome embodiments, one or more of the file type-specific rules 112 may beconfigured to change or modify a characteristic (e.g., structure,format, header information, etc.) of a received data file. It should beappreciated that the file type-specific rules 112 may be configured totransform and/or reformat any type of file (or embedded object) bymodifying any suitable characteristic. Additionally, in someembodiments, one or more of the file type-specific rules 112 may beembodied as mathematical algorithms, which when executed by the filesterilization module 208, transform and/or reformat received data files(or objects embedded within received data files).

As discussed, in some embodiments, the environment 200 may include thevirtual machine monitor (VMM) module 210 (or hypervisor). In suchembodiments, the VMM module 210 may be configured to facilitate andmanage the virtualization of the physical resources of the dataintegrity server 102. In some embodiments, the VMM module 210 mayinitialize and execute multiple guest operating systems and/or virtualenvironments in which data files may be processed. For example, in someembodiments, the VMM module 210 may initialize and execute a separatevirtual machine or environment for each sandbox required. Additionallyor alternatively, the VMM module 210 may initialize and execute aseparate virtual machine for each level of processing performed on adata file or a batch of data files (e.g., anti-malware engineprocessing, file type verification processing, file sterilizationprocessing, etc.).

Referring now to FIG. 3, a method 300 for protecting systems and data ofan organization from malware that may be executed by the data integrityserver 102 begins with block 302. In block 302, the data integrityserver 102 receives a data file to be cleaned (or sterilized). The dataintegrity server 102 may receive the data file to be cleaned via any oneof various different input sources. For example, in block 304, the dataintegrity server 102 may receive an email message from the email server120 including the data file as an attachment. In another example, inblock 306, the data integrity server 102 may receive the data file froma user's computing device such as, for example, the local computingdevice 140. In yet another example, in block 308, the data integrityserver 102 may receive the data file to be cleaned via website download.In block 310, the data integrity server 102 may also receive the datafile to be cleaned from a storage cloud via the cloud storage server170. In another example, in block 312, the data integrity server 102 mayreceive the data file from a virtual safe via the virtual safe server180. Additionally or alternatively, the data integrity server 102 mayintercept a data file that is to be uploaded to a virtual safe prior toencryption. In some examples, in block 314, the data integrity server102 may receive the data file to be cleaned from the FTP server 160. Inother examples, in block 316, the data integrity server 102 may alsoreceive the data file from physical memory devices 132, external memory,or storage media inserted into an optical drive or communicativelycoupled to a communication interface of the local upload device 130 orthe local computing device 140.

In block 318, the data integrity server 102 analyzes the data file withmultiple anti-malware engines to determine whether the data fileincludes any known malware (hidden or otherwise). For example, in someembodiments, the data integrity server 102 may analyze the data filewith two or more, or three or more, anti-malware engines. In a specificembodiment, the data integrity server 102 analyzes the data file withfive different anti-malware engines. Each of the anti-malware enginesmay be embodied as any type of anti-malware or anti-virus engineconfigured to detect various types of malicious code or malware (e.g.,viruses, spyware, adware, nagware, worms, Trojans, etc.) hidden withinthe data file. In some embodiments, each of the anti-malware engines maybe updated periodically to ensure that newly discovered malware can bedetected. In some embodiments, the anti-malware engines may each notifythe data integrity server 102 whether malware was detected within thedata file. The method 300 then advances to decision block 320. If, indecision block 320, the data integrity server 102 determines that one ormore of the anti-malware engines detected malware within the receiveddata file, the method 300 advances to block 322.

In block 322, the data integrity server 102 discards or takes otherpreventative actions in response to one or more of the anti-malwareengines determining that the data file includes a known type of hiddenmalware. For example, in block 324, the data integrity server 102discards the infected file in response to one or more of theanti-malware engines determining that the data file includes a knowntype of hidden malware. In another example, in decision block 326, thedata integrity server 102 determines whether the data file is able to becleaned. In some embodiments, the data integrity server 102 maydetermine whether the infected data file may be cleaned by one or moreof the anti-malware engines. In other embodiments, the data integrityserver 102 may determine whether it may clean the infected data file.If, in decision block 326, the data integrity server 102 determines thatthe infected file may be cleaned, the method 300 advances to block 334.If, however, the data integrity server 102 determines in decision block326 that the file cannot be cleaned, the method 300 advances instead toblock 324 in which the data integrity server 102 discards the infectedfile.

Referring back to decision block 320, if the data integrity server 102determines instead that none of the anti-malware engines (or at least athreshold or reference number of the anti-malware engines) detectedmalware within the received data file, the method advances to block 328.In block 328, the data integrity server 102 verifies the type of thedata file based at least in part on, or otherwise as a function of, theextension of the file. To do so, the data integrity server 102 mayverify that the characteristics (e.g., structure, format, headerinformation, etc.) of the data file correspond to referencecharacteristics of a data file having the same file extension. Forexample, in embodiments wherein the received data file is associatedwith a “.jpg” file extension, the data integrity server 102 may verifythat the characteristics of the data file correspond to the anticipatedcharacteristics of an image file having the same file extension. Indoing so, the data integrity server 102 verifies that the data file iswhat it claims to be based on the associated file extension. It shouldbe appreciated that the data integrity server 102 may utilize anysuitable mechanism for verifying that the actual type of the receiveddata file corresponds to the type of data file anticipated based on thefile extension.

In some embodiments, in block 330, the data integrity server 102 maysecurely process the received data file to facilitate verification. Todo so, the data integrity server 102 may execute, open, render, and/orprocess the data file in a sandbox (e.g., a virtual environment, anisolated environment, etc.). In such embodiments, the data integrityserver 102 may monitor the behavior of the data file while it isprocessed in the sandbox. In some embodiments, the data integrity server102 may monitor for anticipated behavior of the data file based on theextension associated with the data file. Such monitoring may be used bythe data integrity server 102 to facilitate verifying the type of thereceived data file based on the associated extension. Additionally oralternatively, the data integrity server 102 may monitor for suspiciousbehavior while the data file is being processed in the sandbox. Suchmonitoring may be used by the data integrity server 102 to facilitatedetermining whether the received data file includes malware. The method300 then advances to decision block 332. If, in decision block 332, thedata integrity server 102 determines that the type of the received datafile is verified, the method 300 advances to block 334. If, however, thedata integrity server 102 determines instead that the type of thereceived data file is not verified, the method 300 advances to block 322in which the data integrity server 102 discards or takes otherpreventative actions.

In block 334, the data integrity server 102 sanitizes or cleans the datafile to eliminate any unknown or hidden malware. To do so, in someembodiments in block 336, the data integrity server 102 transformsand/or reformats the data file based on one or more file type-specificrules 112 in such a way that malicious code hidden within the data fileis rendered benign but the original file format is retained and minimaldegradation of the quality of the data file occurs. For example, in someembodiments, the data integrity server 102 utilizes one or more filetype-specific rules 112 to change or modify a characteristic (e.g.,structure, format, header information, etc.) of the received data file.The method 300 then advances to block 338 in which the data integrityserver 102 transmits the cleaned data file to the originally intendeddestination (e.g., the email server 120, local upload device 130, localcomputing device 140, web server 150, FTP server 160, cloud storageserver 170, virtual safe server 180, and/or any other computing device)internal or external to the organization.

Referring now to FIG. 4, a method 400 analyzing a batch of files formalware that may be executed by the data integrity server 102 beginswith block 402. In block 402, the data integrity server 102 receives abatch or collection of data files to be analyzed. The data integrityserver 102 may receive the batch of data files to be analyzed via anyone of the various different input sources discussed above (e.g., emailattachments, website downloads, employee workstations, storage clouds,virtual safes, FTP connections, physical storage media 132, etc.).

In block 404, the data integrity server 102 analyzes each data file ofthe batch with multiple anti-malware engines to determine whether thedata file includes any known hidden malware. As discussed, each of theanti-malware engines may be embodied as any type of anti-malware oranti-virus engine configured to detect various types of malicious codeor malware (e.g., viruses, spyware, adware, nagware, worms, Trojans,etc.) hidden within the data file. In some embodiments, the anti-malwareengines may notify the data integrity server 102 each time malware isdetected within a data file of the batch. Additionally or alternatively,the anti-malware engines may more generically notify the data integrityserver 102 that malware was detected in one or more of the data files ofthe batch. The method 400 then advances to decision block 406. If, indecision block 406, the data integrity server 102 determines that noneof the anti-malware engines (or at least a threshold or reference numberof the anti-malware engines) detected malware within the data files ofthe batch, the method 400 advances to block 408. In block 408, the dataintegrity server 102 further processes each data file of the batch ofdata files (e.g., verify each file type based on associated fileextension, clean each data file, etc.). For example, in someembodiments, the data integrity server 102 processes each data file ofthe batch as discussed above with reference to blocks 328-338 of FIG. 3.

Referring back to decision block 406, if the data integrity server 102determines instead that the anti-malware engines detected malware withinone or more of the data files of the batch, the method 400 advances toblock 410. In block 410, the data integrity server 102 discards the datafile(s) or takes other preventative actions. For example, in block 412,the data integrity server 102 discards the infected data files andfurther processes the remaining data files of the batch. In anotherexample, in block 414, the data integrity server 102 discards all of thedata files of the batch in response to determining that one or more ofthe data files contain malware. In yet another example, in decisionblock 416, the data integrity server 102 determines whether the infecteddata files are able to be cleaned. In some embodiments, the dataintegrity server 102 may determine whether the infected data files maybe cleaned by one or more of the anti-malware engines. In otherembodiments, the data integrity server 102 may determine whether it mayclean the infected data files. If, in decision block 416, the dataintegrity server 102 determines that the infected files may be cleaned,the method 400 advances to block 418 in which the infected files and theremaining files of the batch are further processed. If, however, thedata integrity server 102 determines in decision block 416 that theinfected files cannot be cleaned, the method 400 advances instead toblock 414 in which the data integrity server 102 discards all of thedata files of the batch.

In various embodiments disclosed herein, a single component can bereplaced by multiple components and multiple components can be replacedby a single component to perform a given function or functions. Exceptwhere such substitution would not be operative, such substitution iswithin the intended scope of the embodiments.

Some of the figures can include a flow diagram. Although such figurescan include a particular logic flow, it can be appreciated that thelogic flow merely provides an exemplary implementation of the generalfunctionality. Further, the logic flow does not necessarily have to beexecuted in the order presented unless otherwise indicated. In addition,the logic flow can be implemented by a hardware element, a softwareelement executed by a computer, a firmware element embedded in hardware,or any combination thereof.

The foregoing description of embodiments and examples has been presentedfor purposes of illustration and description. It is not intended to beexhaustive or limiting to the forms described. Numerous modificationsare possible in light of the above teachings. Some of thosemodifications have been discussed, and others will be understood bythose skilled in the art. The embodiments were chosen and described inorder to best illustrate principles of various embodiments as are suitedto particular uses contemplated. The scope is, of course, not limited tothe examples set forth herein, but can be employed in any number ofapplications and equivalent devices by those of ordinary skill in theart. Rather it is hereby intended the scope of the invention to bedefined by the claims appended hereto.

We claim:
 1. A data integrity server for protecting systems and data,the data integrity server comprising: a processor executing instructionsstored in memory, wherein the instructions cause the processor toinitialize a virtual machine monitor module, a malware detection module,a file type verification module, and a file sterilization module; thevirtual machine monitor module to initialize a first virtual machine, asecond virtual machine, and a third virtual machine, wherein the firstvirtual machine to execute the malware detection module, the secondvirtual machine to execute the file type verification module, and thethird virtual machine to execute the file sterilization module; themalware detection module to (i) receive a data file for import from anexternal source, (ii) analyze the received data file with ananti-malware engine, (iii) determine whether the received data filecomprises malware based on the analysis, and (iv) discard the receiveddata file in response to a determination that the received data filecomprises malware; the file type verification module to verify, inresponse to a determination that the received data file does notcomprise malware, a file type of the received data file based at leastin part on a file extension associated with the received data file; andthe file sterilization module to: (i) modify a structure of the receiveddata file based on the verified file type and a respective file typemathematical algorithm to transform the received data file into asterilized data file to render malware not detected within the receiveddata file benign, wherein the sterilized data file is different from thereceived data file and is representative of the received data file whenprocessed and; (ii) transmit the sterilized data file to a computingdevice for import of the sterilized data file.
 2. The data integrityserver of claim 1, wherein to modify the structure of the received datafile comprises to modify a format or header information corresponding tothe received data file.
 3. The data integrity server of claim 1, whereinthe malware detection module is further to determine whether thereceived data file can be cleaned in response to a determination thatthe received data file comprises malware; and wherein to discard thereceived data file in response to a determination that the received datafile comprises malware comprises to discard the received data file inresponse to a determination that the received data file cannot becleaned.
 4. The data integrity server of claim 3, wherein the file typeverification module is further to verify, in response to a determinationthat the received data file can be cleaned, the file type of thereceived data file based at least in part on the file extensionassociated with the received data file.
 5. The data integrity server ofclaim 1, wherein to analyze the received data file with an anti-malwareengine comprises to analyze the received data file with a plurality ofanti-malware engines.
 6. The data integrity server of claim 1, whereinto verify the file type of the received data file based at least in parton the file extension associated with the received data file comprisesto (i) process the received data file in a sandbox and (ii) monitor thebehavior of the received data file during processing.
 7. The dataintegrity server of claim 1, wherein to receive the data file for importfrom the external source comprises to receive a batch of data files forimport from the external source; wherein to analyze the received datafile with the anti-malware engine comprises to analyze each data file ofthe batch of data files with an anti-malware engine; and wherein todetermine whether the received data file comprises malware comprises todetermine whether each data file of the batch comprises malware based onthe analysis.
 8. The data integrity server of claim 7, wherein todiscard the received data file comprises to discard each data file ofthe batch in response to a determination that one or more of the datafiles of the batch comprises malware.
 9. The data integrity server ofclaim 7, wherein to discard the received data file comprises to discardeach data file in the batch determined to comprise malware.
 10. The dataintegrity server of claim 7, wherein to discard the received data filecomprises to (i) determine whether each data file in the batchdetermined to comprise malware can be cleaned and (ii) discard each datafile of the batch in response to a determination that one or more of thedata files determined to comprise malware cannot be cleaned.
 11. Amethod for protecting systems and data, the method comprising:initializing, by a virtual machine monitor of a data integrity server, afirst virtual machine, a second virtual machine, and a third virtualmachine; receiving, by the first virtual machine of the data integrityserver, a data file for import from an external source; analyzing, bythe first virtual machine of the data integrity server, the receiveddata file with an anti-malware engine; determining, by the first virtualmachine of the data integrity server, whether the received data filecomprises malware based on the analysis; discarding, by the firstvirtual machine of the data integrity server, the received data file inresponse to determining that the received data file comprises malware;verifying, by the second virtual machine of the data integrity serverand in response to determining that the received data file does notcomprise malware, a file type of the received data file based at leastin part on a file extension associated with the received data file;modifying, by the third virtual machine of the data integrity server, astructure of the received data file based on the verified file type anda respective file type mathematical algorithm to transform the receiveddata file into a sterilized data file to render malware not detectedwithin the received data file benign, wherein the sterilized data fileis different from the received data file and is representative of thereceived data file when processed; and transmitting, by the thirdvirtual machine of the data integrity server, the sterilized data fileto a computing device for import of the sterilized data file.
 12. Themethod of claim 11, wherein modifying the structure of the received datafile comprises modifying a format or header information corresponding tothe received data file.
 13. The method of claim 11, further comprisingdetermining, by the first virtual machine, whether the received datafile can be cleaned in response to a determination that the receiveddata file comprises malware; and wherein discarding the received datafile in response to a determination that the received data filecomprises malware comprises discarding the received data file inresponse to a determination that the received data file cannot becleaned.
 14. The method of claim 13, further comprising verifying, bythe second virtual machine and in response to a determination that thereceived data file can be cleaned, the file type of the received datafile based at least in part on the file extension associated with thereceived data file.
 15. The method of claim 11, wherein analyzing thereceived data file with an anti-malware engine comprises analyzing thereceived data file with a plurality of anti-malware engines.
 16. Themethod of claim 11, wherein verifying the file type of the received datafile based at least in part on the file extension associated with thereceived data file comprises (i) processing the received data file in asandbox and (ii) monitoring the behavior of the received data fileduring processing.
 17. The method of claim 11, wherein receiving thedata file for import from the external source comprises receiving abatch of data files for import from the external source; whereinanalyzing the received data file with the anti-malware engine comprisesanalyzing each data file of the batch of data files with an anti-malwareengine; and wherein determining whether the received data file comprisesmalware comprises determining whether each data file of the batchcomprises malware based on the analysis.
 18. The method of claim 17,wherein discarding the received data file comprises discarding each datafile of the batch in response to a determination that one or more of thedata files of the batch comprises malware.
 19. The method of claim 17,wherein discarding the received data file comprises discarding each datafile in the batch determined to comprise malware.
 20. The method ofclaim 17, wherein discarding the received data file comprises (i)determining whether each data file in the batch determined to comprisemalware can be cleaned and (ii) discarding each data file of the batchin response to a determination that one or more of the data filesdetermined to comprise malware cannot be cleaned.