Security Market Segment LS
Thursday, 11 February 2016 19:14

Zero-Day Exploit (ZDE) prevention for all systems


Check Point has developed SandBlast Agent that integrates new protections and advanced forensics to secure end-point devices and accelerate incident response. In short protection from ZDEs.

Check Point has announced SandBlast Agent, its latest advanced perimeter security and zero-day protection technology to keep end-point devices and the data stored on them safe no matter where they are.

In addition to the proactive protection provided by sandboxing and threat extraction, it incorporates forensics capabilities to automate incident analysis, providing organisations confidence in effectively responding to current and future threats.

In an increasingly connected world, enabling workers to access corporate information through a variety of devices – whether on the office network or from a remote location – can dramatically increase innovation, productivity and growth opportunities. But despite their importance, protection for these devices is limited by traditional, signature-based, anti-virus agents that only detect known threats.

Hackers are now increasingly targeting devices, especially those at the endpoint, with more sophisticated zero-day attacks such as new evasive variants of cryptowall and cryptolocker malware.

“Those of us on the front lines of enterprise security, we see the reality of modern hacking techniques, where anti-virus solutions are becoming less dependable against these newer threats. It is critical not only to do the best job possible detecting the latest malware, but also to respond rapidly as events occur,” said Michael Brine, infrastructure manager, Community Newspaper Group, Perth. “By preventing more attacks from reaching our users, and then empowering our team to quickly contain threats before they can impact operations, we allow our highly mobile workforce to manage their business with confidence.”

SandBlast Agent is currently the only solution that integrates zero-day protection for the end-point with automated forensics and incident response capabilities. Key features include:

  • Protection directly on the endpoint to detect and block advanced attacks from email, removable media and web-based threats such as spear phishing and watering holes. Based on a remote sandboxing model, the non-intrusive, low-overhead deployment has minimal impact on local performance, while maintaining full compatibility with installed applications. Individuals are able to work with a safe, sanitised version of common document formats, while thorough file analysis is underway
  • Detection of suspicious communication activity generated by infected devices, blocks attempts to exfiltrate sensitive data from the organisation and quarantines infected endpoints to prevent the spread of the infection. It is built on Check Point’s next-generation threat prevention solution, SandBlast, which received a “recommended” rating in the most recent NSS Labs Breach Detection Systems (BDS) group test, and was among the top scoring solutions in security effectiveness and value.
  • Automated incident analysis capability providing full visibility into security events to minimise potential damages and related remediation costs. With its automated forensics capabilities, It immediately builds actionable, interactive reports to fully understand the root cause, malware entry points and scope of damage. This enables rapid remediation and limits the spread of malware and the damage it may cause.

“Organisations face significant challenges as hackers aggressively target end-user systems with a range of advanced threats aimed at bypassing signature-based antivirus security products,” said Nathan Shuchami, head of threat prevention, Check Point. “With SandBlast Agent, we are able to prevent attacks based on the latest and most advanced malware techniques, whether users are inside or outside the network perimeter.”

Read 4762 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Ray Shaw

joomla stats

Ray Shaw  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News