Protezione Zero-Day

Threat Extraction
Content Disarm and Reconstruction (CDR)

Threat Extraction removes risky features from files such as macros, embedded objects and more, rather than determining their maliciousness. By cleaning the file before it enters the organization. Threat Extraction preemptively prevents both known and unknown threats, providing better protection against zero-day attacks.

Benefits of Threat Extraction

Content Disarm and Reconstruction (CDR)

Check Point Threat Extraction technology offers an industry-leading Content Disarm and Reconstruction (CDR) solution. Threat Extraction provides several benefits for organizational cybersecurity and employee productivity, including:

 

te mockup 0

Minimal Recipient Impact
Any malicious content is designed to be invisible to the recipient, so CDR has no impact on actual information conveyed by the file.

Safe Delivery
By removing the executable content from the document, the file becomes safe for the recipient, making it possible to send it on to them without risking malware delivery.

Zero Day Protection
CDR removes executable content whether or not it is detected as malicious. This enables it to protect against zero-day threats.

Rapid Delivery
CDR eliminates delays associated with traditional sandboxes and enables real-world deployment for zero-day protection in prevent mode, while delivering cleaned files to users quickly.

Original File Access
In some cases, access to executable content may be required for benign files. With Check Point Threat Extraction, the original file may be accessed by the user after it is confirmed to be benign after sandbox inspection.

×
  Feedback
Questo sito Web utilizza i cookie per motivi funzionali e a scopo di analisi e marketing. Continuando a utilizzare il sito Web, accetti implicitamente l'uso dei cookie. Per ulteriori informazioni, si prega di leggere la nostra Informativa sui cookie.
OK