Products - VFind™ Security ToolKit Family

VFind ToolKit

The VFind™ Security ToolKit (VSTK) is a suite of five powerful network and computer anti-malware utilities, that provide flexible and uncompromising computer anti-malware protection. The VFind™ Security ToolKit contains:

VFind™: The first ever UNIX anti-malware scanner, with a unique heterogeneous design that allows for complete protection in today’s multi-platform networks. All VFind Security ToolKit products feature a Cryptographic Integrity Tool(CIT) and the Universal Atomic Disintegrator(UAD).

VFind™ Daemon: The Daemon Tool provides user applications, virus scanning, and detection services at a high level of performance. Running as a Daemon process, it eliminates the need to re-initialize the scan engines on each request. Thus, reducing the need to use system resources by processing files as they are received, improving response time, and minimizing the effect of virus scanning on the main application.

UAD: Besides its use in anti-virus protection, the UAD tool is built for making identification based upon direct inspection of the data. It makes no assumptions about the file’s contents based upon the file’s name. Which increases response and reduces downtime. This tool also provides the ability for proper data identification through “context switching” which allows for a greater degree of anti-virus protection for files that are used in both Windows and UNIX.

CIT: Is a fantastic anti-malware security tool that has multiple uses. It reports on all files that have been removed, added, modified or duplicated. It can tighten baseline configuration control down to a single bit. It can also be used with surgical precision on an entire system or single file. The CIT tool produces a database of cryptographic hash values for every file it is directed to manage.

AVA: Included in your maintenance and support, AVA is a service that can provide automated, accurate, and rapid responses to cyber threats in the event of cyber warfare or other major event.

Components

Included Tools

VFind™

VFind™ is the malware scanner and pattern analysis tool in the ToolKit, and is unlike any other anti-malware program in existence. It was the first anti-virus scanner for UNIX, the first heterogeneous scanner and the first scanner to incorporate a full virus description language, VDL. VFind™ determines the file type by direct examination of the file's contents. This makes VFind significantly more powerful than other anti-malware products.

The VFind™ Security ToolKit Family of computer security products offers so much more than just virus scanning. Our VSTK family of products supports all UNIX type operating systems including UNIX, Linux (all versions), Solaris, AIX, HPUX, and others. CyberSoft may be able to support any operating system upon request. Our anti-malware includes a virus scanner with a fully published, and accessible, pattern analysis language, as well as a cryptographic integrity tool for baseline management. The VFind ToolKit provides tools to deal with hidden threats, self-repair tools and more. Our products are easily integrable with any other program.

VFind Real-Time Scanner

Actively monitor directories for changes by extracting, inspecting, and scanning new and modified files in real-time.

Cryptographic Integrity Tool

The Cryptographic Integrity Tool (CIT) detects malware, hackers, sabotage and baseline configuration violations from any source. Using cryptographic change detection, we are able to reduce help desk turnaround time from hours to minutes. An end-user calls stating the system doesn't work...they claim they didn't change anything, and a proposal is due out the door by noon. Is it a user error, an attack, or sabotage? CIT will never lie and cannot be tricked!

Universal Atomic Disintegrator

The Universal Atomic Disintegrator (UAD) solves two difficult problems — identification and decomposition. Decomposition of a file to it's smallest indivisible parts is a difficult problem. First the program must have infallible identification of the file in order to decompose it. This is not a problem for UAD, which identifies the file by direct examination of it's contents.

Loopback Head and Loopback Tail

Loopback Head & Loopback Tail (LBH & LBT) ensure that unchanged (but infected) files are re-analyzed by VFind™. LBH reads filenames from a user-customized database; LBT uses the VFind™ output to create a database suitable for use with LBH.

AVA

AVA is a system which provides automated, accurate, and rapid responses to cyber threats in the event of a cyber attack or other major event. Additionally, it provides continuous monitoring of the cyber landscape, identifying new threats and automatically adapting malware definitions to identify them. This service is always included with your active maintenance and support subscription.

VFind™ Daemon

The VFind Daemon provides user applications, virus scanning, and detection services at a high level of performance. Running as a Daemon process, it eliminates the need to re-initialize the scan engines upon each request. All files are processed as they are received, improving response time and minimizing the effect of malware scanning on the main application.

VFind Daemon file scanning and virus detection services, are accessible to any application running on a user's system. It's multi-threading capability enables it to scan requests from multiple applications concurrently. Applications can access VFind Daemon services through an easy-to-use message interface. The Simple Virus Scanning Protocol (SVSP) is a text-based, request/response interface that gives applications full access to VFind Daemon services. SVSP includes commands, that enable the program to set scanning options on a per-request basis and, to specify the file to be scanned. Requests can be tagged so that the subsequent responses can be matched. This allows the anti-malware application to submit multiple scan requests, and allows it to match the asynchronous responses. A client program is also provided to further simplify accessing and using VFind Daemon.

VFind Daemon can also support the interfaces for other available malware scanning Daemons, such as: ClamAV's and clamd. This makes it possible to incorporate VFind Daemon into an existing system with minimal software changes, and enable applications to migrate towards utilizing VFind's additional capabilities, at the leisure of the user.

The multi-threading capability allows VFind Daemon to scale gracefully and take advantage of systems with multiple processors. The thread number used by VFind Daemon, is configurable and can be set to match the available computing power.

Anti-virus Testing

In-House Testing

To deliver to our customers the best security solutions, CyberSoft products are tested against the highest industry standards, utilizing a multi-layered testing strategy.

The first layer of internal testing is to determine that VFind will detect each individual virus signature, that which it's designed to detect. Our next round of tests ensures that VFind does not falsely identify legitimate files as infected files, which could interfere with the operations of our customers.

The next layer of testing is performed on a daily basis:

Falsehit Test: All clean samples in our Falsehit-DB should not be detected by the new VDL set. In addition to this regular test, our engineers perform additional falsehit tests with a much larger more comprehensive falsehit database.

VDL Syntax Test: To check if the VDLs follow proper syntax.

VDL Duplicate Test: To avoid having duplicate VDLs.

We post new VDLs every weekday morning, after successful completion of the above tests.

If any one of these tests fails, VTP stops posting procedures and sends a failure notification to the related people to investigate the issue. If we, or our customers, receive a (posting) notification email, that means the new VDL set successfully passed all the four tests.

Compatibility

CyberSoft continually updates this information as new technologies are released and others are deprecated. If your platform is not listed below, please contact us to find out more.

VSTK Compatibility Chart

The following table represents feature compatibility chart for VSTK. For information about older releases, please contact us for more information.

Operating System Architectures
AIX 6.1 PPC
Debian 9 x86, x86-64
Debian 10 x86, x86-64
Debian 11 AArch64
FreeBSD 10.3 x86
FreeBSD 11 x86-64
FreeBSD 12 x86-64
FreeBSD 14 x86-64
HP-UX 11 Itanium
Red Hat EL 7 x86, x86-64
Red Hat EL 8 x86-64
Red Hat EL 9 x86-64
Solaris 10 x86, x86-64, SPARC
Solaris 11 x86, x86-64, SPARC
SUSE 11 x86
SUSE 12 x86-64
SUSE 15 x86-64
STOP OS x86-64
Ubuntu 14.04 LTS x86, x86-64
Ubuntu 16.04 LTS x86, x86-64
Ubuntu 18.04 LTS x86-64
Ubuntu 20.04 LTS x86-64
Ubuntu 22.04 LTS x86-64
Ubuntu 24.04 LTS x86-64