Call a Specialist Today! (02) 9388 1741
Free Delivery! Free Delivery!

Check Point Sandblast Threat Extraction
Removes exploitable content


Sandblast Threat Extraction

As part of the Check Point Zero-Day Protection SandBlast solution, the Threat Extraction capability removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.


Check Point Products
Next Generation Threat Extraction for Small Appliance
Next Generation Threat Extraction Package for 1 year for Small Appliance
#CPSB-NGTX-S-1Y
Our Price: Request a Quote
Next Generation Threat Extraction Package for 2 years for Small Appliance
#CPSB-NGTX-S-2Y
Our Price: Request a Quote
Next Generation Threat Extraction Package for 3 years for Small Appliance
#CPSB-NGTX-S-3Y
Our Price: Request a Quote
Next Generation Threat Extraction for Small Appliance for HA
Next Generation Threat Extraction Package for 1 year for Small Appliance for HA
#CPSB-NGTX-S-1Y-HA
Our Price: Request a Quote
Next Generation Threat Extraction Package for 2 years for Small Appliance for HA
#CPSB-NGTX-S-2Y-HA
Our Price: Request a Quote
Next Generation Threat Extraction Package for 3 years for Small Appliance for HA
#CPSB-NGTX-S-3Y-HA
Our Price: Request a Quote

Click here to jump to more pricing!

Please Note: All Prices are Inclusive of GST

Overview:

The SandBlast Threat Extraction technology is a capability of SandBlast Network and the SandBlast Agent endpoint protection solutions. It removes exploitable content, reconstructs files to eliminate potential threats, and delivers sanitized content to users in a few seconds to maintain business flow.


Remove Exploitable Content

Remove Exploitable Content

Reconstruct files with known safe elements in web-downloaded documents and emails.

Safe Content Delivery

Safe Content Delivery

Immediate delivery of sanitized versions of potentially malicious files to maintain business flow.

Complete Threat Visibility

Complete Threat Visibility

Access to original files after background analysis of attack attempts.


Features and Benefits:

Benefits

Proactively protect against threats contained in emailed and web-downloaded documents

  • Remove exploitable content, including active content and embedded objects
  • Reconstruct files with known safe elements

Promptly deliver safe content - or sanitized versions of potentially malicious files

  • Proactively provide users with clean, reconstructed files containing only safe elements
  • Immediately deliver reconstructed files to maintain uninterrupted business flow

Provide complete threat visibility with comprehensive, integrated threat prevention and security management

  • Eliminate delays associated with traditional sandboxes, and enable real-world deployment of SandBlast Zero-Day Protection in prevent mode
  • Provide the best protection by converting reconstructed files to PDF format, or maintain flexibility with options to maintain the original file format and specify the type of content to be removed
  • Ensure visibility into attack attempts, and allow access to original file after completing background analysis by SandBlast Threat Emulation

Features

Prompt delivery of safe content

Documents that we use on a daily basis can contain content within them, including macros or embedded links, that can be exploited to infect your computers and networks. Check Point SandBlast Zero-Day Protection utilizes Threat Extraction technology to eliminate threats by removing exploitable content and reconstructing documents using known safe elements. SandBlast Zero-Day Protection promptly delivers safe, sanitized content to its intended destination, and allows access to original files after completing background analysis by the Threat Emulation engine.

Protects most common file types

SandBlast Threat Extraction supports the most common document types used in organizations today, including Microsoft Office Word, Excel, and Power Point, and Adobe PDF documents. Administrators can select which of these document types will undergo Threat Extraction when entering the network via email or web download.

Easy to deploy

Installed as an additional software blade on the gateway as part of the SandBlast Zero-Day Protection solution, SandBlast Threat Extraction is integrated in Mail Transfer Agent-Mode to the email network. It can be applied across the organization, or implemented only for specific individuals, domains, or departments. Administrators can configure included users and groups based upon needs, and can use this to facilitate gradual organizational deployment.

Proactive protection

Traditional detection technologies take time to search for and identify threats before blocking them. Due to unacceptable delays, many solutions are deployed only in detect mode, leaving networks vulnerable to threats. SandBlast Zero-Day Protection leverages its Threat Extraction capability to preemptively eliminate delays associated with traditional solutions, reduce risk, and enable real-world deployment in prevent mode.

Web browser extension

The SandBlast Web Extension allows users within organizations to utilize threat emulation and extraction from within the browser, protecting users from malware downloaded over the web.

Extended protection to endpoints

Using SandBlast Agent, the protections of Threat Extraction can now be extended to end-user systems, keeping users safe no matter where they go. For laptop users roaming beyond the perimeter, attacks originating as attachments within emails or web downloads undergo conversion to safe, reconstructed versions with minimal delay.

Flexible protection options

SandBlast Zero-Day Protection provides flexibility for organizations to select the document protection options that best suit operational needs. For the best protection, it is recommended that documents are reconstructed and converted into a PDF document. Alternatively, organizations can choose to maintain the original document format, and remove content that may pose a threat. This option allows administrators to determine the types of content to remove, from high risk macros to embedded files and external links.

Flexible protection options

Bundled for the best protection

With the Next Generation Threat Prevention & SandBlast™ (NGTX) bundle from Check Point, organizations are able to leverage the protections delivered by Check Point SandBlast Zero-Day Protection, and gain the added protections provided by IPS, Application Control, URL Filtering, Antivirus, Anti-Bot, and Anti-Spam to protect users from downloading malicious files, accessing risky websites, and to stop bot communications before damage is caused. Organizations already leveraging the Next Generation Threat Prevention (NGTP) appliance, can add this capability via the TX bundle.

Specifications:

Feature Description
Supported File Types Microsoft Office 2003-2013, Adobe PDF
Document Languages Supported Latin languages: full support
Non Latin languages: partial support
Deployment Options
  • MTA - gateway receives all incoming email, and forwards it to the next hop after inspection
  • WebAPI - sends files to the machine for reconstruction
  • Web Browser Extension - supports reconstruction and emulation for web downloaded files
Performance ~1% of throughput decrease for 8000 people
1 GB of memory required
Version and OS From R77.30 using SecurePlatform or GAiA
Web Browser Extension Currently supported on the following browser types:
  • Google Chrome (available soon)
  • Other browsers (contact us for availability)

Pricing Notes:

Please Note: All Prices are Inclusive of GST

Check Point Products
Next Generation Threat Extraction for Small Appliance
Next Generation Threat Extraction Package for 1 year for Small Appliance
#CPSB-NGTX-S-1Y
Our Price: Request a Quote
Next Generation Threat Extraction Package for 2 years for Small Appliance
#CPSB-NGTX-S-2Y
Our Price: Request a Quote
Next Generation Threat Extraction Package for 3 years for Small Appliance
#CPSB-NGTX-S-3Y
Our Price: Request a Quote
Next Generation Threat Extraction for Small Appliance for HA
Next Generation Threat Extraction Package for 1 year for Small Appliance for HA
#CPSB-NGTX-S-1Y-HA
Our Price: Request a Quote
Next Generation Threat Extraction Package for 2 years for Small Appliance for HA
#CPSB-NGTX-S-2Y-HA
Our Price: Request a Quote
Next Generation Threat Extraction Package for 3 years for Small Appliance for HA
#CPSB-NGTX-S-3Y-HA
Our Price: Request a Quote