RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Check Point SandBlast

Product
Developers: Check Point Software Technologies
Date of the premiere of the system: August, 2015
Last Release Date: 2019/07/08
Technology: Firewall

Check Point SandBlast is the solution for prevention of threats. Thanks to diagnostics at the level of the CPU for detection of threats to infection of Check Point SandBlast brings security to the following level. Using sensors of the malware, steady against attempts of a bypass, and the improved protection even from the most serious attacks the solution allows to reduce considerably risk of costs from cracking.

2019: Malware DNA representation

On July 8, 2019 the Check Point Software Technologies company, solution provider for cyber security around the world, presented the mechanism of detection of malware on the basis of artificial intelligence in the solution for prevention of threats of SandBlast Network which will provide faster and exact prevention of the harmful attacks. Malware DNA will recognize the last forms of malware, comparing them with earlier known. The mechanism accelerates capability of SandBlast Network to reveal and block vulnerabilities of zero day before they are able to cause any damage.

Malware DNA scans each malware which passes through the isolated software environment of Check Point SandBlast Network. As the vast majority of the malware is created using the existing blocks of a malicious code, Malware DNA accelerates identification of the malware which appeared, earlier not detected and reduces answer time that it is even better to protect the organizations.

The artificial intelligence of Malware DNA and processes of self-training use information on millions of samples of the malware which are already detected by Check Point ThreatCloud. The provided mechanism expands possibilities of SandBlast Network on detection, check and safe content delivery and provides security blanket from the most dangerous target attacks, including threats of zero day.

File:Aquote1.png
Hackers often use already existing code which proved the working capacity to save time and forces therefore the vast majority of malware is created thus. It is possible to tell that the code lines making the malware represent certain DNA of cyberthreats, and the Malware DNA mechanism can quickly compare the code used in malware with the existing families of threats. Thanks to fast tracking even of threats of zero day time of reaction is reduced that considerably reduces risks for the organizations,
speaks Maya Horovets, the head of the Threat Intelligence group of Check Point Software Technologies company
File:Aquote2.png

SandBlast Network is the complete solution for prevention of network threats. It detects the malware and guarantees that content in network of your organization is safe for use, thereby considerably increasing performance of users. SandBlast Network is the integral component of completely consolidated architecture of cyber security of Check Point Infinity which protects all aspects modern IT, including network, endpoints, cloud and mobile computing. SandBlast Network uses analytical data on threats in real time from the Check Point ThreatCloud database for continuous monitoring of threats on all platforms through a uniform glass panel.

NSS Labs, a recognized and reliable source for independent, factual testing of cyber security, gave rating It "is recommended" to the solution Check Point SandBlast. The solution is capable to detect 100% of threats of HTTP and e-mail and also 100% of malware using difficult methods of deviation. At the same time at the solution SandBlast zero false operations.

2015: Key features of SandBlast

In permanent fight of hackers and security experts cybercriminals use tools, including zero day attacks or the modified versions of the existing malware which bypass traditional "sandboxes" and get into infrastructures of their victims unnoticed. These new directions of the attacks require preventive approach using modern solutions and technologies which will be able not only to catch the known threats, but also to identify and stop an unfamiliar malicious code from the moment of its first emergence. The mechanism of detection of exploits at the level of the CPU from Check Point has capability to identify dangerous threats of "zero day" on initial stage before the malware is implemented into infrastructure or will try to bypass detection systems.

Key features of Check Point SandBlast according to information for September, 2015 include:

  • Detection of a malicious code at an invasion stage still before it applies deviation methods from detection. The mechanism of detection cannot be bypassed using cycles of a time delay, attempts to calculate use of the virtualized OS or other methods of a bypass of "sandbox".
  • The detection power combination at the level of the CPU to emulation at the level of OS allows to analyze contents of files of different types, including the documents MS Office, PDF, flash, executive files, archives, etc.
  • Fast delivery of safe versions of files with data with the help of the built-in function of Threat Extraction allowing to block harmful content in the mode of real deployment without considerable delays.

Check Point SandBlast — the representative of a product family of Next Generation which also includes Check Point Threat Emulation and Check Point Threat Extraction. The solution Threat Emulation integrates detection at the level of the CPU with OS level "sandbox". In the NSS Breach Detection Systems Check Point Threat Emulation test received one of the appreciation and it was mentioned as the "Recommended" solution for efficiency of protection, performance and value. The solution also includes the Threat Extraction function which gives to the user an immediate access to safe versions of content while the main files undergo testing. The detection combination at the level of the CPU and the Threat Extraction function allows Check Point SandBlast to raise a bar even above, providing the best level of preventive protection.