Zero-Day Protection

Threat Extraction
Content Disarm and Reconstruction (CDR)

Threat Extraction removes risky features from files such as macros, embedded objects and more, rather than determining their maliciousness. By cleaning the file before it enters the organization. Threat Extraction preemptively prevents both known and unknown threats, providing better protection against zero-day attacks.

Benefits of Threat Extraction

Content Disarm and Reconstruction (CDR)

Check Point Threat Extraction technology offers an industry-leading Content Disarm and Reconstruction (CDR) solution. Threat Extraction provides several benefits for organizational cybersecurity and employee productivity, including:

 

maquette te 0

Minimal Recipient Impact
Any malicious content is designed to be invisible to the recipient, so CDR has no impact on actual information conveyed by the file.

Safe Delivery
By removing the executable content from the document, the file becomes safe for the recipient, making it possible to send it on to them without risking malware delivery.

Zero Day Protection
CDR removes executable content whether or not it is detected as malicious. This enables it to protect against zero-day threats.

Rapid Delivery
CDR eliminates delays associated with traditional sandboxes and enables real-world deployment for zero-day protection in prevent mode, while delivering cleaned files to users quickly.

Original File Access
In some cases, access to executable content may be required for benign files. With Check Point Threat Extraction, the original file may be accessed by the user after it is confirmed to be benign after sandbox inspection.

×
  Commentaires
Ce site web utilise des cookies pour sa fonctionnalité et à des fins d’analyse et de marketing. En poursuivant votre navigation sur ce site, vous acceptez l’utilisation de cookies. Pour plus d’informations, veuillez lire notre Avis sur les cookies.
OK