Call a Specialist Today! 020 3893 1922 | Free Delivery! Free Delivery!


Check Point Sandblast Threat Emulation
Prevents infections from new malware and targeted attacks


Sandblast Threat Extraction

As part of the Check Point SandBlast Zero-Day Protection solution, Threat Emulation prevents infections from new malware and targeted attacks. This innovative zero-day threat sandboxing capability within the SandBlast solution delivers the best possible catch rate for threats, and is virtually immune to attackers' evasion techniques.


Overview:

Benefits

Highest catch rate to protect your organization from unknown malware, zero-day and targeted attacks

  • Detect and block new, unknown malware and targeted attacks found in email attachments, downloaded files, and URLs to files within emails
  • Provide protection across one of the widest range of file types including, MS Office, Adobe PDF, Java, Flash, executables, and archives, as well as multiple Windows OS environments
  • Uncover threats hidden in SSL and TLS encrypted communications

Stop hackers from evading detection and infiltrating your network, reducing risk of expensive breaches

  • Identify even the most dangerous attacks in their infancy using unique CPU-level inspection
  • Unlike static and behavioral analysis, or solutions based on heuristics, evaluation of potential malware occurs at the instruction level, where exploits cannot hide
  • Exploits are caught before malware has an opportunity to deploy and evade detection

Provide complete threat visibility with comprehensive integrated threat prevention and security management

  • Flexible and cost-effective deployment options for organizations of all sizes
  • Leverage existing infrastructure and management tools to reduce capital costs and speed implementation
  • Turn zero-day and unknown attacks into known and preventable attacks by updating signatures for newly discovered attacks to all Check Point gateways subscribed to the ThreatCloud intelligence database

Features

Evasion resistant detection using cutting edge CPU-level technology

Unlike other solutions, Check Point zero-day threat sandboxing uses a unique technology that conducts inspection at the CPU-level to stop attacks before they have a chance to launch.

There are thousands of vulnerabilities and millions of malware implementations, but there are very few methods that cybercriminals utilize to exploit vulnerabilities. The Check Point SandBlast Threat Emulation engine monitors CPU-based instruction flow for exploits attempting to bypass OS security controls.

By detecting exploit attempts during the pre-infection stage Threat Emulation sandboxing stops attacks before they have a chance to evade detection.

Identify more malware

Check Point SandBlast Zero-Day Protection conducts further investigation with OS-level sandboxing by intercepting and filtering inbound files and inspecting URLs linked to files within emails by running them in a virtual environment. File behavior is inspected simultaneously across multiple operating systems and versions. Files engaging in suspicious activity commonly associated with malware, such as modifying the registry, network connections, and new file creation, are flagged and further analyzed. Malicious files are prevented from entering your network.

Analyze over 40 file types and support multiple operating systems

The Threat Emulation engine supports inspection of one the widest range of file types including: MS Office, PDFs, executables, archives, Java, and Flash. In addition, it provides protection against attacks targeting multiple Windows OS environments including Windows XP, Windows 7, and Windows 8.

Full visibility into attack attempts with integrated security management and detailed reporting

Unified security management simplifies the monumental task of managing growing threats, devices and users. Newly identified threats caught by the Threat Emulation engine are displayed in Malware Reports and dashboards with infection summaries and trends to provide better visibility into organizational malware threats and risks.

Additionally, a detailed report is generated after any file goes through the sandbox. The report is easy to understand and includes detailed information about any malicious attempts originated by running the file. The report provides actual screenshots of the environment while running the file for any operating system on which it was simulated.

Uncover encrypted threats

Files delivered into the organization over SSL and TLS represent a secure attack vector that bypasses many industry standard implementations. Check Point SandBlast looks inside SSL and TLS tunnels to extract and launch files to discover threats hidden in those protected streams.

Collaboration for the best protection

For each new threat discovered by Threat Emulation, a new signature is created and sent to Check Point ThreatCloud, where it is distributed to other Check Point connected gateways. Threat Emulation converts newly identified unknown attacks into known signatures, making it possible to block these threats before they have a chance to become widespread. This constant collaboration makes the ThreatCloud ecosystem the most advanced and up-to-date threat network available.

Implementation flexibility to fit any organization

  • Cloud-based service - Files can be sent to the cloud-based service for emulation and analysis from an existing security gateway or from an agent for Exchange server. No infrastructure changes are required at the organization. The cloud-based service enables centralized management and visibility of both threat and service usage information.
  • Dedicated appliance - An on-premise solution ideal for organizations that prefer not to use cloud applications due to regulatory requirements or privacy concerns. The SandBlast Zero-Day Protection dedicated appliances reduce costs by leveraging your existing security infrastructure. Four options are available to address the performance requirements of your organization.
  • Software bundles for the best protection - With the Next Generation Threat Prevention & SandBlast™ (NGTX) software bundle, organizations are able to leverage the protections delivered by Check Point SandBlast Zero-Day Protection. In addition, they gain the added protections provided by IPS, Application Control, URL Filtering, Antivirus, Anti-Bot and Anti-Spam to protect users from downloading malicious files, accessing risky websites, and to stop bot communications before damage is caused. Organizations already leveraging the Next Generation Threat Prevention (NGTP) appliance, can add this capability via the TX bundle.
  • Web browser extension - The SandBlast Web Extension allows users within organizations to utilize threat emulation and extraction from within the browser, protecting users from malware downloaded over the web.

Extended protection for endpoints with SandBlast Agent

Now the advanced protection of Threat Emulation can prevent malware targeting end-user systems while roaming, keeping users safe no matter where they go. SandBlast Agent works with Threat Emulation to detect and block attacks while users are beyond the perimeter, as well as from lateral movement or malware loaded from removable storage devices.

Best-In-Class Security Expanded To Office 365™ Cloud Email

Leveraging the full capabilities of SandBlast Zero-Day Protection, SandBlast Cloud brings proactive protection from sophisticated attacks to Office 365 email users. With the highest malware catch rates, and using CPU-level detection, the Threat Emulation capability within SandBlast Cloud prevents new, unknown and zero-day threats delivered via email and file attachments in cloud-based email environments.

Pricing Notes:

Check Point Products
Threat Emulation and Threat Extraction for High-end Appliance
Threat Emulation and Threat Extraction Package for 1 year for High-end Appliance
#CPSB-TETX-L-1Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 2 years for High-end Appliance
#CPSB-TETX-L-2Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 3 years for High-end Appliance
#CPSB-TETX-L-3Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction for High-end Appliance for HA
Threat Emulation and Threat Extraction Package for 1 year for High-end Appliance for HA
#CPSB-TETX-L-1Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 2 years for High-end Appliance for HA
#CPSB-TETX-L-2Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 3 years for High-end Appliance for HA
#CPSB-TETX-L-3Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction for Mid-Size Appliance
Threat Emulation and Threat Extraction Package for 1 year for Mid-size Appliance
#CPSB-TETX-M-1Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 2 years for Mid-size Appliance
#CPSB-TETX-M-2Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 3 years for Mid-size Appliance
#CPSB-TETX-M-3Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction for Mid-Size Appliance for HA
Threat Emulation and Threat Extraction Package for 1 year for Mid-size Appliance for HA
#CPSB-TETX-M-1Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 2 years for Mid-size Appliance for HA
#CPSB-TETX-M-2Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 3 years for Mid-size Appliance for HA
#CPSB-TETX-M-3Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction for Small Appliance
Threat Emulation and Threat Extraction Package for 1 year for Small Appliance
#CPSB-TETX-S-1Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 2 years for Small Appliance
#CPSB-TETX-S-2Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 3 years for Small Appliance
#CPSB-TETX-S-3Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction for Small Appliance for HA
Threat Emulation and Threat Extraction Package for 1 year for Small Appliance for HA
#CPSB-TETX-S-1Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 2 years for Small Appliance for HA
#CPSB-TETX-S-2Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 3 years for Small Appliance for HA
#CPSB-TETX-S-3Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction for Ultra High-end Appliance
Threat Emulation and Threat Extraction Package for 1 year for Ultra High-end Appliance
#CPSB-TETX-XL-1Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 2 years for Ultra High-end Appliance
#CPSB-TETX-XL-2Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 3 years for Ultra High-end Appliance
#CPSB-TETX-XL-3Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction for Ultra High-end Appliance for HA
Threat Emulation and Threat Extraction Package for 1 year for Ultra High-end Appliance for HA
#CPSB-TETX-XL-1Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 2 years for Ultra High-end Appliance for HA
#CPSB-TETX-XL-2Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 3 years for Ultra High-end Appliance for HA
#CPSB-TETX-XL-3Y-HA
Our Price: Request a Quote
Threat Emulation and Threat Extraction for XXL Appliance
Threat Emulation and Threat Extraction Package for 1 year for XXL
#CPSB-TETX-XXL-1Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 2 years for XXL
#CPSB-TETX-XXL-2Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 3 years for XXL
#CPSB-TETX-XXL-3Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction for XXXL Appliance
Threat Emulation and Threat Extraction Package for 1 year for XXXL
#CPSB-TETX-XXXL-1Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 2 years for XXXL
#CPSB-TETX-XXXL-2Y
Our Price: Request a Quote
Threat Emulation and Threat Extraction Package for 3 years for XXXL
#CPSB-TETX-XXXL-3Y
Our Price: Request a Quote