Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

THREAT PREVENTION

Updated Nov. 5, 2020 ©2020 Check Point Software Technologies Ltd. 1


TODAY ONE ATTACK CAN SHUT
DOWN AN ENTIRE
COUNTRY’S POWER GRID,
DISRUPT TRANSPORTATION
SYSTEMS, OR STEAL
THE PERSONAL
INFORMATION OF MILLIONS.

©2020 Check Point Software Technologies Ltd. 2


ATTACKS ARE CONSTANTLY
30% MORE
WEB-BASED ATTACKS EVOLVING
INCREASE
INCREASE OF
OF
CYBER
CYBER THREATS
THREATS
42% MORE OVER
OVER THE
THE
TARGETED
TARGETED CYBER
CYBER ATTACKS
ATTACKS PREVIOUS
PREVIOUS YEAR
YEAR

58% MORE
MOBILE MALWARE FAMILIES

125% MORE
SOCIAL MEDIA PHISHING SITES
©2020 Check Point Software Technologies Ltd. 3
THE THREATS ARE STILL
GROWING!

*PWC The Global State of Information Security ® Survey 2016

©2020 Check Point Software Technologies Ltd. 44


ADVANCED THREAT
PREVENTION

©2020 Check Point Software Technologies Ltd. 5


WE HAVE THE

INNOVATIVE
TECHNOLOGY
DEVELOPING PROTECTIONS AGAINST THE
EVER-CHANGING THREAT LANDSCAPE

INTRUSION THREAT MOBILE


PREVENTION EMULATION THREAT PREVENTION

STATEFUL INSPECTION THREATCLOUD CPU-LEVEL THREAT


FIREWALL THREAT EXTRACTION
PREVENTION
©2020 Check Point Software Technologies Ltd. 6
WITH BEST-IN-CLASS

THREAT PREVENTION
FOR END-TO-END PROTECTION

PRE-INFECTION POST-INFECTION
- CPU AND OS LEVEL THREAT - ANTI-BOT
EMULATION - ANTIVIRUS
- INTRUSION PREVENTION
ENTERPRISE
- APPLICATION CONTROL CAMPUS
- THREAT EXTRACTION
- ANTIVIRUS
- ANTI-SPAM
MOBILE DESKTOP
(PHYSICAL/
VIRTUAL)

DATA CENTER
(VIRTUAL/PHYSICAL)

CLOUD APPLICATIONS
(LOCAL / SAAS)

©2020 Check Point Software Technologies Ltd. 7


A Family of Advanced Threat
Prevention TECHNOLOGIES

THREAT THREAT ZERO ENDPOINT ZERO


EMULATION EXTRACTION PHISHING FORENSICS RANSOMWARE

CPU-Level and Safeguard Rapid understanding


Proactively eliminate Identify and recover
OS-Level evasion credentials against for better
malware vehicles of from ransomware
resistant deception response and
delivery infections
engines and theft remediation

©2020 Check Point Software Technologies Ltd. 88


9
©2020 Check Point Software Technologies Ltd.

ANTI
ANTI PHISHING
PHISHING
MACHINE
MACHINE DOCUMENT
DOCUMENT BEHAVIOR
BEHAVIOR
LEARNING
LEARNING VALIDITY
VALIDITY ANALYTICS
ANALYTICS
ANTI
ANTI CPU
CPU LEVEL
LEVEL
RANSOMWARE
RANSOMWARE DETECTION
DETECTION
THREAT
THREAT
EXTRACTION
EXTRACTION
FORENSICS
FORENSICS
OVER 27 ADVANCED THREAT DETECTION AND

MEMORY
MEMORY
ANALYSIS
ANALYSIS
PREVENTION TECHNOLOGIES
DECOYS
DECOYS &
& TRAPS
TRAPS
WEB
WEB
INSPECTION
INSPECTION
THE FIRST AND ONLY UNIFIED
CROSS-PLATFORM THREAT PREVENTION

MOBILE
Perimeter and Datacenter Endpoint and Browsers Cloud Applications
Custom Applications
Custom applications
protection protection protection protection protection

NGTX GATEWAYS SANDBLAST AGENT SANDBLAST CLOUD


SANDBLAST MOBILE
SANDBLAST API

SHARING COMMON INTELLIGENCE AND THREAT MANAGEMENT


©2020 Check Point Software Technologies Ltd. 10
EMULATION AND
EXTRACTION SERVICE
HOSTED IN THE CLOUD HOSTED ON PREMISE

SandBlast Cloud Service SandBlast TE Appliance

API
©2020 Check Point Software Technologies Ltd. 11
Identify Attack Origin Exploit Code Schedule Execution
Chrome exploited while Dropper process Malware registered to launch
browsing launched by Chrome after boot

Dropped Malware
From Trigger to Infection Attack Traced Dropper downloads and
Even across system boots installs malware
Automatically trace back
the infection point Data Breach
Malware reads
sensitive documents

Activate
Investigation Malware
Trigger
Scheduled
Identify the processtask
thatlaunches
accessed the C&C after boot
server

©2020 Check Point Software Technologies Ltd. 12


Expanding Advanced Threat Prevention
Coverage
Block UNKNOWN and ZERO-DAY ATTACKS in Microsoft Office 365™ Email

• Advanced Threat Prevention for


Office 365
• Fast and Transparent User Experience
• Easy to Deploy and Manage

CLOUD-BASED
EMAIL
©2020 Check Point Software Technologies Ltd. 1313
Check Point SandBlast
Recommended for Security Effectiveness and Value
100% HTTP Malware

100% Email Malware

100% SMB Malware

100% Drive-by-Exploits (only


vendor)

97.2% Detection Rate

Fastest solution (7Gbps)

Lowest TCO

©2020 Check Point Software Technologies Ltd. 14


THANK YOU

©2020 Check Point Software Technologies Ltd. 15

You might also like