Zero-Day Protection

Threat Extraction
Content Disarm and Reconstruction (CDR)

Threat Extraction removes risky features from files such as macros, embedded objects and more, rather than determining their maliciousness. By cleaning the file before it enters the organization. Threat Extraction preemptively prevents both known and unknown threats, providing better protection against zero-day attacks.

Benefits of Threat Extraction

Content Disarm and Reconstruction (CDR)

Check Point Threat Extraction technology offers an industry-leading Content Disarm and Reconstruction (CDR) solution. Threat Extraction provides several benefits for organizational cybersecurity and employee productivity, including:

 

TE 목업 0

Minimal Recipient Impact
Any malicious content is designed to be invisible to the recipient, so CDR has no impact on actual information conveyed by the file.

Safe Delivery
By removing the executable content from the document, the file becomes safe for the recipient, making it possible to send it on to them without risking malware delivery.

Zero Day Protection
CDR removes executable content whether or not it is detected as malicious. This enables it to protect against zero-day threats.

Rapid Delivery
CDR eliminates delays associated with traditional sandboxes and enables real-world deployment for zero-day protection in prevent mode, while delivering cleaned files to users quickly.

Original File Access
In some cases, access to executable content may be required for benign files. With Check Point Threat Extraction, the original file may be accessed by the user after it is confirmed to be benign after sandbox inspection.

×
  피드백
이 웹사이트는 기능 및 분석, 마케팅 목적으로 쿠키를 사용합니다. 이 웹사이트를 계속 이용하면 쿠키 사용에 동의하는 것입니다. 자세한 내용은 쿠키 관련 공지사항을 참조하세요.