Tag Archives: malware

Check Point Changes the Malware Game with New Threat Prevention Solution

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the largest pure-play security vendor globally, today announced Check Point SandBlast, a new Advanced Threat Prevention solution that provides a level of cyber protection unmatched in today’s market. By using CPU-level threat detection to uncover threats at the pre-infection level, Check Point SandBlast elevates threat defense with evasion-resistant malware detection and comprehensive protection from even the most dangerous attacks, significantly reducing the risk of expensive breaches.

In the ongoing battle between hackers and security professionals, attackers are increasingly utilizing more sophisticated tools such as new zero-day attack methods and custom variants of existing malware to circumvent traditional sandboxing technology and slip into their victims’ infrastructures undetected. These new attack vectors require a proactive approach with modern solutions and technologies that not only catch known threats, but are also able to identify and stop unknown malware the first time it is seen in the wild. Check Point’s new cutting-edge CPU-level exploit detection engine is uniquely capable of identifying the most dangerous, zero-day threats in their infancy, before malware has an opportunity to deploy and even attempt to evade detection.

“The cyber war is raging on, and the key to staying ahead of the latest threats is to implement proactive security measures to maximize the quality of protection without sacrificing operational efficiency,” says Mike Stiglianese, Managing Director, Axis Technology, LLC, and former Chief Information Technology Risk Officer at a major financial institution. “With the new CPU-level detection capabilities, Check Point continues to raise the bar with innovative and comprehensive security solutions to offer the most advanced artillery to defend against these sophisticated and highly targeted cyberattacks.”

“In today’s rapidly evolving threat landscape, security is now a higher priority than ever. Adding technology that can protect our critical business assets against newer malware, while also delivering content without interrupting business flow is a tremendous step forward,” states Richard Peirce, Director, Infrastructure Services at Boston Properties. “It’s important for us to carefully look at the resources required to deploy any new product in our environment. Our sandboxing solution by Check Point was deployed and running quickly, and operates with limited ongoing management oversight.”

Key features of Check Point SandBlast include:

  • Identification of malware at the exploit phase, even before evasion techniques can be applied. It cannot be bypassed by delay loops, attempts to determine if a virtualized OS is in use, or other methods aimed at bypassing the sandbox.
  • Combines the power of CPU-level detection with OS-level emulation to evaluate content in a broad range of file types, including MS Office, PDF, flash, executables, and archives, among others.
  • Promptly delivering safe versions of data files with the integrated Threat Extraction capability, enabling real-world deployment to block malicious content, without introducing significant delay.

Check Point SandBlast is part of the Next Generation Threat Prevention product family and includes Threat Emulation and Threat Extraction. Threat Emulation combines the new CPU-level detection with recently evaluated OS-level sandboxing. NSS Breach Detection Systems testing named Check Point Threat Emulation as one of the top-scoring “Recommended” solutions for security effectiveness, performance and value. The new Check Point SandBlast also includes Threat Extraction, adding the capability to provide users with access to safe versions of content immediately while files are under evaluation. By combining CPU-level detection and Threat Extraction, Check Point SandBlast raises the bar even higher, providing the greatest level of proactive protection available.

“Enterprises are at risk of falling victim to targeted attacks, but implementing proactive, preventative technologies to block malware from entering the network will protect your business without compromising efficiency. Check Point SandBlast provides an additional layer of security from even the most sophisticated attacks by catching more malware, with minimal impact on delivery times,” said Gil Shwed, Founder & CEO of Check Point Software Technologies. “The growth of our Threat Prevention portfolio continues to extend our depth of technology to enable us to continue arming our customers with innovative defensive strategies against cybercrime. Together with Check Point Mobile Threat Prevention, Check Point is moving quickly and aggressively to secure the future.”

“The Asia Pacific region is facing a dichotomy of tremendous growth versus technology equivalence, whereby a company may grow very fast and yet its network security infrastructure may struggle to keep up with the growth,” says Steve McWhirter, vice president, Asia, Middle East and Africa, Check Point Software Technologies. “With the new Check Point SandBlast technology, there is now a much more effective defense against many of the insidious advanced persistent threats (APTs) that may plague fast-growing and rapidly expanding enterprises throughout this region.”


Check Point SandBlast is available immediately, as a cloud service or on-premise appliance solution, through our worldwide partners: http://partners.us.checkpoint.com/partnerlocator/.

Follow Check Point via:

Check Point Blog: http://blog.checkpoint.com/

Twitter: http://www.twitter.com/checkpointsw

Facebook: http://www.facebook.com/checkpointsoftware

YouTube: http://www.youtube.com/user/CPGlobal

LinkedIn: https://www.linkedin.com/company/check-point-software-technologies


Related Posts:

Protect your Mac with Trend Micro’s MacClean Tool

Who says malware attacks are only focused on Windows-based computers? Mac users are now being targetted with threats and the most recent one is the malware known as Crisis or Morcut.

Leading security company, Trend Micro, recently released its free clean-up solution designed for Apple fans called MacClean. While the company has a paid security subscription, Smart Surfing for Mac, MacClean makes it for other antivirus users experience how Trend Micro seriously work when it comes to malware infections.
Per press release, once downloaded, this easy-to-use tool scans your Mac and alerts you to any infections found. On discovery of an infection, MacClean prompts you to remove the malware and notifies you once the clean-up has been successful.

Crisis, also known as Morcut, affects Snow Leopard and Lion users typically installs secretly on Macs and stays on the machines until it’s removed. Once installed, it runs certain commands that it receives remotely from a malicious user. Doing this puts affected Macs and information found on the Macs at great risk.

To know more about this Mac infection, you may refer to this blog.

Download the MacClean Tool for free at Trend Micro.

Full disclosure: I work for Trend Micro but this blog is not connected to Trend Micro in anyway nor do they have control over the articles that I write.

This post was first published at KabayanTech.com.

Related Posts:

DNSChanger malware to shut down Internet access in July 9

After heating up the news late last week, some people are now in panic as their computer may have been infected with a malware reported by FBI after a series of investigation.

DNSChanger, also known as “RSPlug,” “Puper,” and “Jahlav” is a malware created by a group of Internet hackers named Rove Digital in 2007 that modifies the Domain Name Server (DNS) thereby diverting users to the hackers’s site or server when browsing a legitimate website online. Per news reports, FBI will start shutting down infected computers’s access to the internet starting tomorrow, July 9. Cybercrime gang Rove Digital was busted by the FBI’s Operation Ghost Click last fall.

In the Philippines, telecommunications giants PLDT and Smart have sent notifications to their subscribers to have their computers checked as early as June 27th. 

To automatically check if your computer is infected, FBI had established websites for the public to use. Visit either of the two links below: 


Should you fail to check your computer’s status, there are still ways on how you can get rid of the infection come July 9th. You may refer to the link below for the step-by-step instructions: http://esupport.trendmicro.com/solution/en-us/1060827.aspx 

To know more about this malware, visit the link below: 


Related Posts:

Nuffnang Philippines: Newest Target of Internet Phishing?

Nuffnang Philippines, one of the most popular online advertising company in the country, recently released its statement pertaining to the internet phishing attack affecting its members.

The growing number of bloggers in the Philippines makes it more fun to stay online and read various stuff being shared by fellow Filipinos who are now conquering the cyber space. But for malware engineers, this is a great time to attack users.

The reported attacks are said to be drawing potentials in hacking bloggers’s information and redirecting site address from the legitimate Nuffnang site to a fake one. These attempts can exploit users for profit.

Click here to learn more.

Related Posts: