“Those of us on the front lines of enterprise security, we see the reality of modern hacking techniques, where antivirus solutions are becoming less dependable against these newer threats. It is critical not only to do the best job possible detecting the latest malware, but also to respond rapidly as events occur,” said Michael Brine, Infrastructure Manager, Australia-based Community Newspaper Group. “By preventing more attacks from reaching our users, and then empowering our team to quickly contain threats before they can impact operations, we allow our highly mobile workforce to manage their business with confidence.”
In addition to the proactive protection provided by sandboxing and threat extraction, SandBlast Agent incorporates forensics capabilities to automate incident analysis. Key features include:
Protection directly on the endpoint to detect and block advanced attacks from email, removable media and web-based threats such as spear phishing and watering holes. Based on a remote sandboxing model, the non-intrusive, low-overhead deployment has minimal impact on local performance, while maintaining full compatibility with installed applications.
SandBlast Agent detects suspicious communication activity generated by infected devices, blocks attempts to exfiltrate sensitive data from the organisation and quarantines infected endpoints to prevent the spread of the infection.
With its automated forensics capabilities, SandBlast Agent can immediately build actionable, interactive reports to fully understand the root cause, malware entry points and scope of damage. This enables rapid remediation and limits the spread of malware.
“Organisations face significant challenges as hackers aggressively target end-user systems with a range of advanced threats aimed at bypassing signature-based antivirus security products,” said Nathan Shuchami, head of threat prevention, Check Point. “With SandBlast Agent, we are able to prevent attacks based on the latest and most advanced malware techniques, whether users are inside or outside the network perimeter.”
No comments:
Post a Comment