Академический Документы
Профессиональный Документы
Культура Документы
1
Check Point Security Report 2015
DETAILED REPORTS Unlike detection technologies that require time to search for
and identify threats before blocking them, Threat Extraction
A detailed report is generated for each file emulated and
preemptively eliminates risk, ensuring prompt delivery of safe
found to be malicious. The easy to understand report
documents.
includes file details and information about any abnormal
activity or malicious attempts originated by running the
file. The report provides actual screenshots of the
environment while running the file for any operating
system on which it was simulated.
THREATCLOUDTM ECOSYSTEM
Newly discovered threats are sent to the ThreatCloud
intelligence database. Each newly discovered threat
signature is distributed across the ThreatCloud
ecosystem to protect other Check Point connected
gateways. This enables connected gateways to block
the new threat before it has a chance to become
widespread. Constant collaboration makes ThreatCloud
the most advanced and up-to-date threat Intelligence
network available.
Using SandBlast Agent, these same advanced zero-day Inline or span-port deployment – connect the TE appliance
protections can now be extended to end-user systems, inline – files and objects are examined inline by the TE appliance
preventing threats targeting the endpoint, including:
MTA – Acting as a Mail Transfer Agent, the Check Point security
Laptops while roaming beyond the perimeter gateway receives incoming mails, and scans or cleans their
Malware originating on removable storage devices content before forwarding it to the next hop mail server – MTA
supports both Threat Emulation and Threat Extraction
Lateral movement of infections within the network
Threat Prevention API – Open API allows sending files to the
BEST-IN-CLASS SECURITY EXPANDED TO appliance for inspection by Threat Emulation and for Threat
Extraction
OFFICE 365™ CLOUD EMAIL
Web Browser Extension – supports emulation and reconstruction
Leveraging the full capabilities of SandBlast Zero-Day
of downloaded files on web browsers, including Google Chrome
Protection, SandBlast Cloud brings proactive protection from
unknown and zero-day attacks to Office 365 email users. SandBlast Agent – The capabilities of SandBlast Zero-Day
SandBlast Cloud utilizes Microsoft APIs for deep integration, Protection are now available on endpoint devices. Available on the
following Operating Systems: Windows 7, 8 and 10
allowing a transparent user experience while ensuring full
email continuity. SandBlast Cloud – Non-intrusive solution that expands
capabilities of SandBlast Zero-Day Protection to Office 365 cloud
email environments
Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@checkpoint.com
CONTACT US
U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com
©2016 Check Point Software Technologies Ltd. All rights reserved.
May 20, 2016