Product Id: 32927626
Description: Check Point SandBlast TE100X - Security appliance - with 1 year Threat Emulation, Threat Extraction, Antivirus and Anti-Bot Annual Service - 4 virtual machines - GigE - 1U - demo - rack-mountable
Mfr Part #: CPAP-SBTE100X-4VM-DEMO
With the increase in sophistication of cyber threats, many targeted attacks begin with exploiting software vulnerabilities in downloaded files and email attachments. These threats include new exploits, or even variants of known exploits unleashed almost daily with no existing signatures and therefore no standard solutions to detect those variants. New and undiscovered threats require new solutions that go beyond signatures of known threats. Check Point SandBlast zero-day protection, with evasion-resistant malware detection, provides comprehensive protection from even the most dangerous attacks while ensuring quick delivery of safe content to your users. At the core of the solution are two capabilities - threat emulation and threat extraction that take threat defense to the great level.
As part of the Check Point SandBlast solution, the threat emulation engine picks up malware at the exploit phase, even before hackers can apply evasion techniques attempting to bypass the sandbox. Files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before it enters your network. This advanced solution combines CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous exploits, and zero-day and targeted attacks. In addition, the SandBlast threat extraction capability immediately provides a safe version of potentially malicious content to users. Exploitable content, including active content and various forms of embedded objects, are extracted out of the reconstructed file to eliminate potential threats. Access to the original suspicious version is blocked, until it can be fully analyzed by SandBlast zero-day protection. Users have immediate access to content, and can be confident they are protected from the most advanced malware and zero-day threats.
- Prevents new and unknown attacks in documents and executable files
- Makes it virtually impossible for hackers to evade detection
- Reduces costs by leveraging existing security infrastructure
- Maximizes protection through unified management, monitoring, and reporting
- Threat extraction removes exploitable content to deliver clean files without delay
- CPU-level technology catches malware before it has an opportunity to deploy and evade detection
- Comprehensive threat protection
SandBlast appliances protect you from both known and unknown threats with antivirus, anti-bot, threat emulation (sandboxing), and threat extraction technologies.
- SandBlast zero-day protection
The SandBlast threat emulation technology employs the fast and accurate sandboxing engine available to pre-screen files, protecting your organization from attackers before they enter your network.
- Evasion resistant detection
Traditional sandbox solutions detect malware behavior at the OS level - after the exploitation has occurred and the hacker code is running. They are therefore susceptible to evasion. SandBlast threat emulation capability utilizes a unique CPU-level inspection engine which monitors the instruction flow at the CPU-level to detect exploits attempting to bypass OS security controls, effectively stopping attacks before they have a chance to launch.
- Proactive prevention with prompt delivery of safe content
When it comes to threat prevention, there doesn't have to be a trade-off between speed, coverage and accuracy. Check Point zero-day protection can be deployed in prevent mode, while still maintaining uninterrupted business flow. SandBlast threat extraction removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.
- Inspect encrypted communications
Files delivered into the organization over SSL and TLS represent a secure attack vector that bypasses many industry standard implementations. Check Point threat prevention looks inside these protected SSL and TLS tunnels to extract and launch files to discover hidden threats.
- Threat emulation detailed report
Every file emulation generates a detailed report. Simple to understand, the report includes detailed forensic information about any malicious attempts originated by running this file. The report provides actual screenshots of the simulated environments while running the file.