Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Zero day endpoint protection

Check Point : 12 February, 2016  (New Product)
SandBlast Agent from Check Point brings advanced zero day protection directly to endpoint devices regardless of their mobility
Zero day endpoint protection

Check Point has announced SandBlast Agent, an evolution of the company’s advanced perimeter security and zero-day protection technology SandBlast, designed to keep endpoint devices and the data stored on them safe no matter where they go.

In addition to the proactive protection to PCs and laptops provided by SandBlast’s CPU-level sandboxing and threat extraction, SandBlast Agent includes forensics capabilities to automate incident analysis, helping organizations to respond more effectively to current and future threats.

In many organizations, endpoint devices have limited protection based on signature-based antivirus agents that only detect known threats.  With hackers now targeting endpoint devices with more sophisticated tactics such as zero-days, businesses need to take a new approach to improve endpoint security.  SandBlast Agent is the only solution that integrates zero-day protection for the endpoint with automated forensics and incident response capabilities. Key features include:

* Endpoint security designed for today’s business demands. SandBlast Agent implements protection directly on the endpoint to detect and block advanced attacks from email, removable media and web-based threats such as spear phishing and watering holes.  Based on a remote sandboxing model, the low-overhead agent has minimal impact on local performance, while maintaining full compatibility with installed applications. Individuals are able to work with a safe, sanitized version of common document formats, while thorough file analysis is underway.

* Next-generation technology to identify, contain infections. SandBlast Agent detects suspicious communication activity generated by infected devices, blocks attempts to exfiltrate sensitive data from the organization and quarantines infected endpoints to prevent the spread of the infection. SandBlast Agent is built on Check Point’s SandBlast

* Comprehensive, automated analysis for actionable reporting. The automated incident analysis capability in SandBlast Agent provides full visibility into security events to minimize potential damages and related remediation costs.  With its automated forensics capabilities, SandBlast Agent immediately builds actionable, interactive reports to fully understand the root cause of attacks, malware entry points and scope of damage. This enables rapid remediation and limits the spread of malware and the damage it may cause.

“Organizations face significant challenges as hackers aggressively target end-user systems with a range of advanced threats aimed at bypassing signature-based antivirus security products,” said Nathan Shuchami, head of threat prevention, Check Point. “With SandBlast Agent, we are able to prevent attacks based on the latest and most advanced malware techniques, whether users are inside or outside the network perimeter.”

Whether remote or not, employees are more likely than ever to be inadvertently exposed to malware after downloading malicious files, putting the enterprise network at risk of additional infection.  Check Point’s threat research team has seen continued growth in many ransomware variants targeting the endpoint, including a range of different implementations of the widespread CryptoWall and Cryptolocker malware designed to avoid detection.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo