Zero-Day Protection

Threat Extraction
Content Disarm and Reconstruction (CDR)

Threat Extraction removes risky features from files such as macros, embedded objects and more, rather than determining their maliciousness. By cleaning the file before it enters the organization. Threat Extraction preemptively prevents both known and unknown threats, providing better protection against zero-day attacks.

Benefits of Threat Extraction

Content Disarm and Reconstruction (CDR)

Check Point Threat Extraction technology offers an industry-leading Content Disarm and Reconstruction (CDR) solution. Threat Extraction provides several benefits for organizational cybersecurity and employee productivity, including:

 

TE 樣機 0

Minimal Recipient Impact
Any malicious content is designed to be invisible to the recipient, so CDR has no impact on actual information conveyed by the file.

Safe Delivery
By removing the executable content from the document, the file becomes safe for the recipient, making it possible to send it on to them without risking malware delivery.

Zero Day Protection
CDR removes executable content whether or not it is detected as malicious. This enables it to protect against zero-day threats.

Rapid Delivery
CDR eliminates delays associated with traditional sandboxes and enables real-world deployment for zero-day protection in prevent mode, while delivering cleaned files to users quickly.

Original File Access
In some cases, access to executable content may be required for benign files. With Check Point Threat Extraction, the original file may be accessed by the user after it is confirmed to be benign after sandbox inspection.

×
  反映意見
本網站使用cookies來實現其功能以及分析和行銷目的。 繼續使用本網站即表示您同意使用cookies 。 欲了解更多信息,請閱讀我們的cookies聲明