Information Technology

Items 97 to 102 of 357 total

Set Descending Direction
per page

Grid  List 

  • Check Point Anti-Spam & Email Security Software Blade for High Availability - Subscription License - 1 License - 3 Year

    Check Point Anti-Spam & Email Security Software Blade for High Availability - Subscription License - 1 License - 3 Year Learn More
    $20,310.80

  • Check Point Anti-Spam & Email Security Software Blade for High Availability - Subscription License - 1 License - 1 Year

    Check Point Anti-Spam & Email Security Software Blade for High Availability - Subscription License - 1 License - 1 Year Learn More
    $5,415.01

  • Check Point Anti-Spam & Email Security Software Blade for High Availability - Subscription License - 1 License - 2 Year

    Check Point Anti-Spam & Email Security Software Blade for High Availability - Subscription License - 1 License - 2 Year Learn More
    $10,819.49

  • Check Point Anti-Spam & Email Security Software Blade for High Availability - Subscription License - 1 License - 3 Year

    Check Point Anti-Spam & Email Security Software Blade for High Availability - Subscription License - 1 License - 3 Year Learn More
    $16,634.78

  • Check Point DLP Software Blade for High Availability - Subscription License - 1 User - 2 Year

    Check Point DLP Software Blade for High Availability - Subscription License - 1 User - 2 Year Learn More
    $18,054.05

  • Check Point Quantum TE2000XN-28VM Network Security Appliance - Threat Emulation - 2 Port - 10/100/1000Base-T, 100GBase-X, 10GBase-SR - 100 Gigabit Ethernet - 2 x RJ-45 - 2 Total Expansion Slots - 1U - Rack-mountable, Rail-mountable

    With the increase in sophistication of cyber threats, many targeted attacks begin with exploiting software vulnerabilities in downloaded files and email attachments. New and undiscovered threats require new solutions that go beyond signatures of known threats.

    SandBlast Zero-Day Protection

    Check Point SandBlast Zero-Day Protection, with evasion-resistant malware detection, provides comprehensive protection from even the most dangerous attacks while ensuring quick delivery of safe content to your users. At the core of our solution are two unique capabilities-Threat Emulation (sandboxing) and Threat Extraction (Content Disarm & Reconstruction) that take threat defense to the next level.

    Evasion-resistant Sandbox

    As part of the Check Point SandBlast solution, the Threat Emulation engine detects malware at the exploit phase, even before hackers can apply evasion techniques attempting to bypass the sandbox. Files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before it enters your network. This innovative solution combines CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous exploits, and zero-day and targeted attacks.

    Content Disarm & Reconstruction (CDR)

    In addition, the SandBlast Threat Extraction (CDR) capability immediately provides a safe version of potentially malicious content to users. Exploitable content, including active content and various forms of embedded objects, are extracted out of the reconstructed file to eliminate potential threats.

    Access to the original suspicious version is blocked, until it can be fully analyzed by SandBlast Zero-Day Protection. Users have immediate access to content, and can be confident they are protected from the most advanced malware and zero-day threats.

    SANDBLAST APPLIANCES

    We offer a wide range of SandBlast Appliances. These are perfect for customers who have regulatory or privacy concerns preventing them from using the SandBlast Threat Emulation cloud-based service.

    Unknown Threat Protection

    The SandBlast Threat Emulation technology employs the fastest and most accurate sandboxing engine available to pre-screen files, protecting your organization from attackers before they enter your network. Traditional sandbox solutions detect malware behavior at the OS level-after the exploitation has occurred and the hacker code is running. They are therefore susceptible to evasion. SandBlast Threat Emulation capability utilizes a unique CPU-level inspection engine which monitors the instruction flow at the CPU-level to detect exploits attempting to bypass OS security controls, effectively stopping attacks before they have a chance to launch.

    SandBlast Threat Extraction removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.

    Configure Threat Extraction in one of two ways: Quickly provide a reconstructed document to the user, or await response from SandBlast Threat Emulation before determining whether or not to reconstruct the document.

    Inspect Encrypted Communications

    ? Files delivered into the organization over SSL and TLS represent a secure attack vector that bypasses many industry standard implementations. Check Point Threat Prevention looks inside these protected SSL and TLS tunnels to extract and launch files to discover hidden threats.

    Learn More
    $127,283.51

Items 97 to 102 of 357 total

Set Descending Direction
per page

Grid  List