Sunteți pe pagina 1din 3

Check Point SandBlast Agent | Datasheet

CHECK POINT
SANDBLAST AGENT

CHECK POINT INSIGHTS


SANDBLAST AGENT Despite evident advances in threat detection and prevention, breaches are still
occurring in ever-growing numbers. The reality is that there are many facets to
The Power to Protect. securing your organization’s infrastructure, and today’s cybercriminals are modifying
The Insight to Understand. their attack strategy to capitalize on blind spots in endpoint security.

As more employees use corporate devices to work remotely, and as employees,


Product Benefits contractors, and consultants bring systems into the enterprise, cybercriminals take
 Protects endpoint devices against advantage of weaknesses in traditional endpoint security to infiltrate and infect these
advanced and zero-day threats workers’ systems. Once inside, hackers leverage lateral communications through the
 Enables users roaming outside the network to infect additional devices. As threats evolve, organizations must find ways
corporate network to work safely to continuously detect, prevent, and respond quickly to attacks on the endpoint in
 Delivers a comprehensive view of order to limit damages.
attack history prior to discovery
 Drives full understanding of root
cause, malware entry points, and SOLUTION
scope of damage Check Point SandBlast Agent extends industry-leading network protections, including
 Accelerates response time and the advanced capabilities of SandBlast Zero-Day Protection and Anti-Bot, to endpoint
reduces chance of reinfection devices. This ensures complete coverage across threat vectors, letting your
 Simple, non-intrusive solution that employees work safely no matter where they are. SandBlast Agent protects from
leverages existing infrastructure threats delivered via web downloads, content copied from removable storage devices,
links or attachments in email messages, lateral movement of data and malware
Product Features between systems on a network segment and infections delivered via encrypted
 Defends against multiple attack content.
vectors, including web downloads,
external storage devices, lateral
movement, or encrypted content SandBlast Agent captures forensics data with continuous collection of all relevant
 Quickly delivers safe, sanitized system events, and then provides actionable incident analysis to quickly understand
versions of documents without the complete attack lifecycle. With visibility into the scope, damage, and attack
interrupting business continuity vectors, incident response teams maximize productivity and minimize organizational
 Identifies and contains infected hosts exposure.
to limit damages and malware spread
 Continuously collects data on user
systems for later forensics use
 Automatically builds actionable
forensics reports with key attack
information
Prevent Identify and Automate
 Integrated monitoring and
Zero-Day Contain Incident
investigation of security events
Attacks Infections Analysis
through SmartEvent and SmartLog

©2016 Check Point Software Technologies Ltd. All rights reserved.


February 9, 2016
Check Point SandBlast Agent | Datasheet

PREVENTS ZERO-DAY ATTACKS ACTIONABLE INCIDENT ANALYSIS


Check Point SandBlast Agent extends the proven protections The forensics analysis process automatically starts when a
of SandBlast Zero-Day Protection to endpoint devices. By malware event occurs. Using a combination of advanced
quickly inspecting files in a virtual sandbox, Threat Emulation algorithms and deep analysis of the raw forensic data, it
discovers malicious behavior and prevents infection from builds a comprehensive incident summary. The summary
new malware and targeted attacks. Threat Extraction provides key actionable attack information, including:
reconstructs downloaded files, eliminating potential threats Malicious events – What evidence of suspicious behavior
and promptly delivering a safe version to users. was detected throughout the attack lifecycle?
Entry point – How did the attack enter the network? What
IDENTIFIES AND CONTAINS INFECTIONS were the main elements used in the attack? How was the
With a local version of Anti-Bot security protection, attack initiated?
continuously updated with the latest Threat Intelligence data Damage scope – What did the malware do once activated
via ThreatCloud, SandBlast Agent identifies and blocks bot that may impact the business? What data was compromised
communications with command and control servers to and/or copied externally?
contain and quarantine any infected hosts. Infected hosts – Who else or what else is affected?

COMPREHENSIVE COVERAGE ACROSS


THREAT VECTORS
SandBlast Agent secures endpoint devices from threats
delivered via web downloads, content copied from removable
storage devices, infections caused by lateral movement of
data and malware between systems on a network segment,
as well as infections delivered via encrypted content.

This comprehensive attack diagnostics and visibility supports


remediation efforts. System administrators and incident
response teams can swiftly and efficiently triage and resolve
attacks, getting your organization back to business as usual
quicker.

DETAILED INCIDENT REPORTS


The forensics capability within SandBlast Agent allows you to
FULL VISIBILITY OF SECURITY EVENTS view event reports, triggered from the gateway or endpoint
itself, from a central location using SmartEvent. Security
Check Point SandBlast Agent provides full visibility with its
Administrators can also generate reports for known malicious
forensics capabilities, monitoring and recording all endpoint
events, providing a detailed cyber kill chain analysis. These
events: files affected, processes launched, system registry
reports provide actionable incident analysis, accelerating the
changes, and network activity. SandBlast Agent can trace
process of understanding the complete attack lifecycle,
and report the steps taken by malware, including zero-day
damage and attack vectors.
threats. Continuous monitoring by SandBlast Agent ensures
that data is available after a completed attack, even those
that remove files and other indicators of compromise left on
the system.

©2016 Check Point Software Technologies Ltd. All rights reserved.


February 9, 2016
Check Point SandBlast Agent | Datasheet

THIRD-PARTY INTEGRATION EASY TO DEPLOY AND MANAGE


SandBlast Agent works in conjunction with Antivirus and SandBlast Agent can be quickly deployed and all policies are
other security solutions from Check Point, as well as from managed centrally through SmartCenter. Access to the event
other vendors. It enhances the detection capabilities of logs and incident reports is provided though SmartEvent and
existing Antivirus products, enabling protection from SmartLog, providing deep insight to understand even the
advanced threats and providing actionable incident analysis. most advanced attacks.

When triggered by an event or investigation request by


The non-intrusive, low-overhead deployment utilizes a
another Check Point component or third party solution,
SandBlast remote sandbox running as a service – on either
endpoint forensics logs are analyzed to generate reports
the SandBlast Cloud or your own private appliances –
viewable in SmartEvent and SmartLog.
resulting in minimal impact on local performance and full
compatibility with installed applications.

TECHNICAL SPECIFICATIONS
SANDBLAST AGENT
Operating System  Windows 7, 8, and 10
Supported Browsers  Chrome
(For SandBlast Browser Extension)  Internet Explorer 10 and above
THREAT EMULATION AND THREAT EXTRACTION
Supported Content Channels  SandBlast Browser Extension
 File-System monitor (Threat Emulation only)
Supported File Types – Threat Extraction  Adobe PDF
 Microsoft Word, Excel, and PowerPoint
Supported File Types – Threat Emulation Over 40 file types, including:
 Adobe PDF
 Microsoft Word, Excel, and PowerPoint
 Executables (EXE, COM, SCR)
 Shockwave Flash - SWF
 Rich Text Format – RTF
 Archives
Threat Emulation and Extraction Deployment Options  SandBlast Cloud
 SandBlast Appliance
ANTI-BOT
Enforcement Modes  Detect and alert
 Block (background & hold modes)
FORENSICS
Analysis Triggers  Anti-Bot detection on the network
 Anti-Bot detection on the endpoint
 Threat Emulation detection on the network
 Check Point Antivirus detection on the endpoint
 Third-party Antivirus detection on the endpoint
 Manual Indicators of Compromise (IoCs)
Damage Detection  Automatically identify: Data exfiltration, data manipulation or encryption, key
logging
Root Cause Analysis  Automatically trace and identify root cause across multiple system restarts
Malware Flow Analysis  Automatically generated interactive graphic model of the attack flow
Malicious Behavior Detection  Over 40 malicious behavior categories
 Hundreds of malicious indicators
MANAGEMENT
Policy Management  Endpoint Policy Management (EPM)
Event Monitoring  SmartLog
 SmartEvent
Endpoint Management Version  E80.63 and above
Endpoint Management - Available Packages  Included as standard with SmartCenter and Smart-1 appliances
 Available as a software license

Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@checkpoint.com
CONTACT US
U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com
©2016 Check Point Software Technologies Ltd. All rights reserved.
February 9, 2016

S-ar putea să vă placă și