Documente Academic
Documente Profesional
Documente Cultură
3 Importance of Zero-Day
threat prevention
4 Consolidated Threat
Intelligence
Account
Web Phishing
Take Over
LAPTOPS
Malicious Account
SMARTPHONES & Web Phishing
Application Take Over
TABLETS
Malicious Account
Phishing
CLOUD Application Take Over
APPLICATIONS
File
Share
Malicious
Application
Malicious
Web Network
TARGETED MOBILE ATTACK
Step2: Infect your device and/or tap your network
Victim is tricked to download a “legitimate” app
in order to take control over the phone
File
Share
Malicious
Application
Malicious
Web Network
Click to Enlarge
TARGETED MOBILE ATTACK
Step 3: Collect Data
Attacker gets full remote control over the device, steals passwords,
mail, identify the location and use the recorder and camera per need
File
Share
Malicious
Application
Malicious
Web Network
Click to Enlarge
TARGETED MOBILE ATTACK
Step 4: Create devastating damage
Attacker takes over your accounts, he has unlimited opportunities,
steal private and corporate data, access your cloud apps
File
Share
Malicious
Application
Malicious
Web Network
MULTI-VECTOR ATTACK
Step 1: Phishing scam for Account Takeover
Phishing mail requesting to update your O365 credentials
File
Share
Malicious
Application
Malicious
Web Network
Click to Enlarge
MULTI-VECTOR ATTACK
Step 1: Phishing scam for Account Takeover
Clicking the link leads to a malicious phishing web site
File
Share
Malicious
Application
Malicious
Web Network
Click to Enlarge
MULTI-VECTOR ATTACK
Step 1: Phishing scam for Account Takeover
Victim is tricked to use his credential and account take over
succeeded
File
Share
Malicious
Application
Malicious
Web Network
MULTI-VECTOR ATTACK
Step 2: Shifting to a whaling attack
Attacker uses the stolen account and send wire transfer request
for the CFO, using the Victim e-mail account
File
Share
Malicious
Application
Malicious
Web Network
Click to Enlarge
MULTI-VECTOR ATTACK
Step 2: Shifting to a whaling attack
Wire transfer completed
File
Share
Malicious
Application
Malicious
Web Network
Click to Enlarge
CONNECTING THE DOTS
Unlimited paths to take control of your assets
File Share
Malicious
Application
Malicious
Web Network
Traditional Protections are insufficient
On-Device Analysis
Machine Learning-based App Detection
Man-in-the-Middle Analysis
Jailbreaking / Rooting Detection
Malicious URL / Phishing* Real Time Intelligence
Download Prevention Policy, Monitoring &
Control
©2018 Check Point Software Technologies Ltd. 28
Advanced Threat
Prevention for laptops in
INTRODUCING: a single agent
”
easily make the shortlist
(Forrester – Wave Report,
June 2018)
LAPTOP SECURITY
REQUIRES A HOLISTIC
SOLUTION
Employees are connecting
remotely from outside the
secured perimeter
They are being targeted while
working remotely
Malware has become polymorphic, it also
spreads via lateral movement, evading
traditional Anti-Virus engines
Such sophisticated malware can only be
prevented by advanced engines
Signature only agents are insufficient
Automated Forensic
and Remediation (EDR)
Threat Threat
Emulation Extraction
Forensics Anti-Bot
Full Attack
Chain URL
Remediation Filtering
Automated Anti
Incident Analysis Ransomware
Reports
Behavioral
Guard (AI) Zero-
Phishing
CADET Anti-
(AI) Exploit
(AI)
External
Document
Media
Encryption
encryption
Full Disk Document
Encryption Access
Control
Port
Protection
Application
Control
End Point
EndPoint
IPsec and
Compliance
SSL VPN
2 Identity Protection
for secure
authentication
3 for O365 and G-Suite
1 Threat Prevention
using advanced
engines
4 control over your
cloud application
security events
Analyzes attacks as well
date leakage incidents and
shadow IT apps
Authentication
Identity Protection
Anti-
Phishing
Intuitive Cloud
Intelligence Management Risk Profile
Agent and
Agentless
IDENTITY PROTECTION
• ID-Guard technology identifies imposturous access
• Blocks unauthorized users and devices, on mobile and PCs
Accesses App
Stolen
credentials
Identity Provider
ADFS, AzureAD, Okta
IDENTITY PROTECTION
Accesses Identity
app Provider
Identifies Device
Hacker Illegitimate Login
Attempts
Identity
to access
Provider
with
Stolen ID
Attempts to
access with Identity
stolen ID Provider
Intelligence
Cloud
Laptops SmartPhones Applications
Powered by AI engines
©2019 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 46
Summary