GETTING A STEP AHEAD OF THE UNKNOWN Zero-day and advanced persistent threats use the element of surprise to bypass traditional security, making these threats difficult to protect against—and very popular with hackers. Traditional sandboxing was designed to help with these types of threats, but cybercriminals have evolved their techniques, creating evasive malware that can avoid detection by many sandbox solutions. As a result, many organizations find themselves taking reactive steps to counteract infection, rather than preventing it in the first place. To get ahead, enterprises need a multi-faceted prevention strategy that combines proactive protection that eliminates threats before they reach users, and state-of-the-art CPU-level exploit detection to expose even the most highly camouflaged threats.
CCSABasic knowledge of networking6 months to 1 year of experience with Check Point products recommended
Technical professionals who support, install, deploy or administer Check Point Software Blades.
COURSE GOAL Provide an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology COURSE TOPICS Threat AnatomySandBlast Threat EmulationSandBlast Threat ExtractionThreatCloud Emulation ServiceDeployment ScenariosSandBlast Troubleshooting