Soumettre la recherche
Mettre en ligne
SandBlast Agent
•
1 j'aime
•
1,031 vues
MarketingArrowECS_CZ
Suivre
Virtualization Forum 2016 Praha, 11.10.2016 sál Check Point
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 28
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
MarketingArrowECS_CZ
Check Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
MarketingArrowECS_CZ
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
MarketingArrowECS_CZ
WannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
Check Point Software Technologies
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
Check Point Software Technologies
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
Diana Frolova
2015 Security Report
2015 Security Report
Check Point Software Technologies
Contenu connexe
Tendances
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
Check Point Software Technologies
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
MarketingArrowECS_CZ
Protecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero Tolerance
Check Point Software Technologies
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
Check Point Software Technologies
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
Check Point Software Technologies
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
Moti Sagey מוטי שגיא
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
MarketingArrowECS_CZ
Check Point mission statement
Check Point mission statement
Moti Sagey מוטי שגיא
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
Moti Sagey מוטי שגיא
Check Point Threat emulation 2013
Check Point Threat emulation 2013
Group of company MUK
Check Point and Accenture Webinar
Check Point and Accenture Webinar
Check Point Software Technologies
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
AlgoSec
FROM OPEN SOURCE COMPLIANCE TO SECURITY
FROM OPEN SOURCE COMPLIANCE TO SECURITY
Black Duck by Synopsys
Check point presentation june 2014
Check point presentation june 2014
David Berkelmans
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
NRC
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
Scalar Decisions
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey מוטי שגיא
Tendances
(20)
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
Protecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero Tolerance
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
Check Point mission statement
Check Point mission statement
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
Check Point Threat emulation 2013
Check Point Threat emulation 2013
Check Point and Accenture Webinar
Check Point and Accenture Webinar
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
FROM OPEN SOURCE COMPLIANCE TO SECURITY
FROM OPEN SOURCE COMPLIANCE TO SECURITY
Check point presentation june 2014
Check point presentation june 2014
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
En vedette
Is Your Technology Vendor Misleading You?
Is Your Technology Vendor Misleading You?
Dameon Welch-Abernathy
BLAST (Basic local alignment search Tool)
BLAST (Basic local alignment search Tool)
Ariful Islam Sagar
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
MarcoTechnologies
Cisco pat adamiak navigating with a world of many clouds
Cisco pat adamiak navigating with a world of many clouds
Khazret Sapenov
G2 server - Cloud není vhodný pro každého
G2 server - Cloud není vhodný pro každého
MarketingArrowECS_CZ
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
MarketingArrowECS_CZ
Delivering Services in a World of Many Clouds
Delivering Services in a World of Many Clouds
Cisco Service Provider
Veeam - Dostupnost Always-On
Veeam - Dostupnost Always-On
MarketingArrowECS_CZ
PCE, OpenFlow, & the Centralized Control Plane
PCE, OpenFlow, & the Centralized Control Plane
Metaswitch NTD
Spirent 400G Ethernet Test Solution - A Technical Overview
Spirent 400G Ethernet Test Solution - A Technical Overview
Sailaja Tennati
From virtual to high end HW routing for the adult
From virtual to high end HW routing for the adult
MarketingArrowECS_CZ
Mplswc2006 white paper-v1.1
Mplswc2006 white paper-v1.1
Sean Andersen
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
MarketingArrowECS_CZ
Open management interfaces for NFV
Open management interfaces for NFV
Anees Shaikh
Ключевые тенденции отрасли в последнее время
Ключевые тенденции отрасли в последнее время
SkillFactory
En vedette
(15)
Is Your Technology Vendor Misleading You?
Is Your Technology Vendor Misleading You?
BLAST (Basic local alignment search Tool)
BLAST (Basic local alignment search Tool)
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
Cisco pat adamiak navigating with a world of many clouds
Cisco pat adamiak navigating with a world of many clouds
G2 server - Cloud není vhodný pro každého
G2 server - Cloud není vhodný pro každého
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Delivering Services in a World of Many Clouds
Delivering Services in a World of Many Clouds
Veeam - Dostupnost Always-On
Veeam - Dostupnost Always-On
PCE, OpenFlow, & the Centralized Control Plane
PCE, OpenFlow, & the Centralized Control Plane
Spirent 400G Ethernet Test Solution - A Technical Overview
Spirent 400G Ethernet Test Solution - A Technical Overview
From virtual to high end HW routing for the adult
From virtual to high end HW routing for the adult
Mplswc2006 white paper-v1.1
Mplswc2006 white paper-v1.1
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Open management interfaces for NFV
Open management interfaces for NFV
Ключевые тенденции отрасли в последнее время
Ключевые тенденции отрасли в последнее время
Similaire à SandBlast Agent
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
eGov Magazine
Csa summit seguridad en el sddc
Csa summit seguridad en el sddc
CSA Argentina
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival: Are You Ready?
Radware
Crack the Code
Crack the Code
InnoTech
Create a Unified View of Your Application Security Program – Black Duck Hub a...
Create a Unified View of Your Application Security Program – Black Duck Hub a...
Denim Group
APT Monitoring and Compliance
APT Monitoring and Compliance
Marcus Clarke
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Hussein Khazaal
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
aliciasyc
Ochrana pred modernými malware útokmi
Ochrana pred modernými malware útokmi
MarketingArrowECS_CZ
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Adelaide Hill
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
MarketingArrowECS_CZ
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
Lancope, Inc.
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
Nextel S.A.
Evolving threat landscape
Evolving threat landscape
Motiv
Take the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
Unitrends
All your files now belong to us
All your files now belong to us
Peter Wood
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
MarketingArrowECS_CZ
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PROIDEA
CleanDNS_enUS
CleanDNS_enUS
Bruno Guerreiro, COBIT, ITIL, MCSO, LPIC3 Security
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
Imperva
Similaire à SandBlast Agent
(20)
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Csa summit seguridad en el sddc
Csa summit seguridad en el sddc
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival: Are You Ready?
Crack the Code
Crack the Code
Create a Unified View of Your Application Security Program – Black Duck Hub a...
Create a Unified View of Your Application Security Program – Black Duck Hub a...
APT Monitoring and Compliance
APT Monitoring and Compliance
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
Ochrana pred modernými malware útokmi
Ochrana pred modernými malware útokmi
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
Evolving threat landscape
Evolving threat landscape
Take the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
All your files now belong to us
All your files now belong to us
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CleanDNS_enUS
CleanDNS_enUS
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
Plus de MarketingArrowECS_CZ
INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
MarketingArrowECS_CZ
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
MarketingArrowECS_CZ
Chráníte správně svoje data?
Chráníte správně svoje data?
MarketingArrowECS_CZ
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
MarketingArrowECS_CZ
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
MarketingArrowECS_CZ
Infinidat InfiniGuard
Infinidat InfiniGuard
MarketingArrowECS_CZ
Infinidat InfiniBox
Infinidat InfiniBox
MarketingArrowECS_CZ
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
MarketingArrowECS_CZ
Základy licencování Oracle software
Základy licencování Oracle software
MarketingArrowECS_CZ
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
MarketingArrowECS_CZ
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
MarketingArrowECS_CZ
Oracle Data Protection - 2. část
Oracle Data Protection - 2. část
MarketingArrowECS_CZ
Oracle Data Protection - 1. část
Oracle Data Protection - 1. část
MarketingArrowECS_CZ
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
MarketingArrowECS_CZ
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
MarketingArrowECS_CZ
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
MarketingArrowECS_CZ
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
MarketingArrowECS_CZ
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
MarketingArrowECS_CZ
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
MarketingArrowECS_CZ
Plus de MarketingArrowECS_CZ
(20)
INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Chráníte správně svoje data?
Chráníte správně svoje data?
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
Infinidat InfiniGuard
Infinidat InfiniGuard
Infinidat InfiniBox
Infinidat InfiniBox
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
Základy licencování Oracle software
Základy licencování Oracle software
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
Oracle Data Protection - 2. část
Oracle Data Protection - 2. část
Oracle Data Protection - 1. část
Oracle Data Protection - 1. část
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
Dernier
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
Asko Soukka
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Commit University
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
UiPathCommunity
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
Udaiappa Ramachandran
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
Jamie (Taka) Wang
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
Aggregage
20230104 - machine vision
20230104 - machine vision
Jamie (Taka) Wang
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
Brian Pichman
20150722 - AGV
20150722 - AGV
Jamie (Taka) Wang
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
Adtran
Designing A Time bound resource download URL
Designing A Time bound resource download URL
Runcy Oommen
Nanopower In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
Pedro Manuel
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
Adam Moalla
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
DianaGray10
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
DianaGray10
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
Md Hossain Ali
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
D Cloud Solutions
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
Liveplex
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
SkyPlanner
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software
Dernier
(20)
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
20230104 - machine vision
20230104 - machine vision
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
20150722 - AGV
20150722 - AGV
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
Designing A Time bound resource download URL
Designing A Time bound resource download URL
Nanopower In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
SandBlast Agent
1.
©2016 Check Point
Software Technologies Ltd. 1©2016 Check Point Software Technologies Ltd. [Confidential] For designated groups and individuals Adding more protection layers at the endpoint (aneb na co AV a FW nestačí) Martin Koldovský | Threat Prevention Security Engineer, Eastern Europe SANDBLAST AGENT Začínáme ve 13:35
2.
©2016 Check Point
Software Technologies Ltd. 2 Check Point BLOG [Confidential] For designated groups and individuals • http://blog.checkpoint.com/tag/sandblast-agent- forensics/
3.
©2016 Check Point
Software Technologies Ltd. 3[Confidential] For designated groups and individuals SANDBLAST AGENT Z e r o - D a y P r o t e c t i o n f o r E n d p o i n t s THREAT EXTRACTION & EMULATION FOR ENDPOINTS • Deliver sanitized content • Emulation of original files • Protects web downloads and file copy Prevent Zero-Day Attacks Identify & Contain Infections Effective Response & Remediation
4.
©2016 Check Point
Software Technologies Ltd. 4 Prevent Endpoint Threats [Confidential] For designated groups and individuals Attack Vectors that need to be covered Outside of the office M2M inside the perimeter Removable Media
5.
©2016 Check Point
Software Technologies Ltd. 5 Prevent Endpoint Threats [Confidential] For designated groups and individuals • Offer the same unknown malware protection regardless of location including downloads over HTTPS • Protect from files arriving encrypted or password protected in archives or on removable media • Protect from traffic arriving East- West inside the network
6.
©2016 Check Point
Software Technologies Ltd. 6[Confidential] For designated groups and individuals SANDBLAST CLOUD (Public or Private) Browser Extension Web downloads Threat Extraction & Threat Emulation File-System Monitor Any file copied or created Threat Emulation Zero-day Protection – How it Works
7.
©2016 Check Point
Software Technologies Ltd. 7[Confidential] For designated groups and individuals Instant Protection for Web Downloads Deliver safe content quickly Convert to PDF or a sanitized version in original format
8.
©2016 Check Point
Software Technologies Ltd. 8[Confidential] For designated groups and individuals Self-Catered, No Helpdesk Overhead Access to the Original File After Threat Emulation is Completed
9.
©2016 Check Point
Software Technologies Ltd. 9[Confidential] For designated groups and individuals SANDBLAST AGENT Z e r o - D a y P r o t e c t i o n f o r E n d p o i n t s THREAT EXTRACTION & EMULATION FOR ENDPOINTS • Deliver sanitized content • Emulation of original files • Protects web downloads and file copy Prevent Zero-Day Attacks Identify & Contain Infections Effective Response & Remediation
10.
©2016 Check Point
Software Technologies Ltd. 10[Confidential] For designated groups and individuals SANDBLAST AGENT Z e r o - D a y P r o t e c t i o n f o r E n d p o i n t s ANTI-BOT & QUARANTINE FOR ENDPOINTS • Detect & Block C&C communications • Pinpoint infections • Quarantine infected host Prevent Zero-Day Attacks Identify & Contain Infections Effective Response & Remediation
11.
©2016 Check Point
Software Technologies Ltd. 11 Identify and Contain Threats [Confidential] For designated groups and individuals Attack Vectors that need to be covered Identify infection outside of the office Block data exfiltration outside of the office Quarantine and remediate infected machines
12.
©2016 Check Point
Software Technologies Ltd. 12 Identify and Contain Threats [Confidential] For designated groups and individuals • Offer the same C&C detection regardless of location with added process / user information. • Prevent data from being sent to C&C and stop initial conversations with known C&C servers • Allow remediation of malicious events and containment of problem devices
13.
©2016 Check Point
Software Technologies Ltd. 13[Confidential] For designated groups and individuals Lockdown and isolate infected machines Prevent malware damage • Block Command and Control Communications • Prevent Data Exfiltration Sandblast Agent: Anti-Bot Anti-Bot on the Endpoint Identify compromised hosts • Inside & Outside the network • Pinpoint when inside the network Detect the C&C Channel – and we know the host is infected Block the C&C Channel – and we contain the malware Communications Blocked C&C communications ANTI-BOT
14.
©2016 Check Point
Software Technologies Ltd. 14[Confidential] For designated groups and individuals SANDBLAST AGENT Z e r o - D a y P r o t e c t i o n f o r E n d p o i n t s ANTI-BOT & QUARANTINE FOR ENDPOINTS • Detect & Block C&C communications • Pinpoint infections • Quarantine infected host Prevent Zero-Day Attacks Identify & Contain Infections Effective Response & Remediation
15.
©2016 Check Point
Software Technologies Ltd. 15 Identify & Contain Infections [Confidential] For designated groups and individuals SANDBLAST AGENT Z e r o - D a y P r o t e c t i o n f o r E n d p o i n t s AUTOMATIC FORENSIC ANALYSIS & ATTACK REMEDIATION • Incident Analysis • Make network detections actionable • Understand AV detections • Clean & remediate the full attack Prevent Zero-Day Attacks Effective Response & Remediation
16.
©2016 Check Point
Software Technologies Ltd. 16[Confidential] For designated groups and individuals There is no incident response Without incident understanding Questions: • Is it real? • How did it enter? • Was data stolen? • How do we clean it?
17.
©2016 Check Point
Software Technologies Ltd. 17 Making Todays Detections Actionable [Confidential] For designated groups and individuals SandBlast Agent Forensics Bot event detected C&C communication blocked Infected host C&C server Understanding The Attack
18.
©2016 Check Point
Software Technologies Ltd. 18[Confidential] For designated groups and individuals Investigation Trigger Identify the process that accessed the C&C server Identify Attack Origin Chrome exploited while browsing Dropped Malware Dropper downloads and installs malware Exploit Code Dropper process launched by Chrome Activate Malware Scheduled task launches after boot Attack traced even across system boots
19.
©2016 Check Point
Software Technologies Ltd. 19[Confidential] For designated groups and individuals Understanding an incident Instant answers to important questions Malicious and suspicious activities Drill-down detail Severity Q1: Is it a real infection?
20.
©2016 Check Point
Software Technologies Ltd. 20 Understanding an Incident [Confidential] For designated groups and individuals Summary Detail Q2: How Did the Malware Get In?
21.
©2016 Check Point
Software Technologies Ltd. 21 Understanding an Incident [Confidential] For designated groups and individuals Breached data files Q3: What is the Damage? Was data stolen?
22.
©2016 Check Point
Software Technologies Ltd. 22 From Understanding to Action [Confidential] For designated groups and individuals Generate a remediation script Q4: How to remediate? How do we clean it?
23.
©2016 Check Point
Software Technologies Ltd. 23[Confidential] For designated groups and individuals Interactive Forensics Report • Single view of entire attack • Tracks all attack elements • Spans multiple reboots • Drill-down on any element Comprehensive View of Attack Flow
24.
©2016 Check Point
Software Technologies Ltd. 24[Confidential] For designated groups and individuals Local Security Event (TE, AB, AM) Automated Incident Analysis Ongoing Forensic Data Collection trigger analysis Digested Incident Report • Malicious Behaviour • Attack Vector • Data Breach • Graphic Attack Model • Quarantine and Remediation Network Detection 3rd party AV detection IOC provided manually SmartEvent How Forensics Analysis Works
25.
©2016 Check Point
Software Technologies Ltd. 25 Identify & Contain Infections [Confidential] For designated groups and individuals SANDBLAST AGENT Z e r o - D a y P r o t e c t i o n f o r E n d p o i n t s AUTOMATIC FORENSIC ANALYSIS & ATTACK REMEDIATION • Incident Analysis • Make network detections actionable • Understand AV detections • Clean & remediate the full attack Prevent Zero-Day Attacks Effective Response & Remediation
26.
©2016 Check Point
Software Technologies Ltd. 26 SandBlast Agent – Closing the Loop [Confidential] For designated groups and individuals PROTECTION AND CONTAINMENT FORENSICS AND RESPONSE M A K I N G D E T E C T I O N S A C T I O N A B L E I M P R O V E S E C U R I T Y P O S T U R E Automated Incident Analysis Policy Changes IOC Updates Remediation
27.
©2016 Check Point
Software Technologies Ltd. Q&A [Confidential] For designated groups and individuals
28.
©2016 Check Point
Software Technologies Ltd. HTTP://BLOG.CHECK POINT.COM/TAG/SAN DBLAST-AGENT- FORENSICS/ [Confidential] For designated groups and individuals
Télécharger maintenant