SANDBLAST AGENT -
СОВРЕМЕННАЯ ЗАЩИТА
РАБОЧИХ СТАНЦИЙ
Десятилетиями традиционный антивирус был де-факто единственным решением для защиты пользовательских устройств – конечных точек доступа в ИТ-ландшафте компании.
В современном динамичном мире, где от сотрудников требуется мобильность и эффективность, доступ к корпоративным файлам и ресурсам из офиса, из дома или из кафе, функциональности традиционных антивирусов оказывается недостаточно. Предотвращение известных и неизвестных киберугроз (т.н. угроз "нулевого дня", для которых еще нет сигнатур и репутации), на уровне рабочих станций становится важнейшим требованием к системе безопасности.

SandBlast Agent – это модульная конструкция из технологий, которые защищают рабочие станции
на всех этапах атаки, и работают параллельно и в одной связке.
70%
$1 млн
#1
100% защита
Успешных атак начинаются
с рабочих станций
Может достигать ущерб бизнеса от атак, 63% из которых успешны
По результатам теста NSS Labs BPS 2019 решение стало лучшим среди конкурентов
Из тысяч заказчиков, никто не пострадал от нашумевших атак*
* по состоянию на конец октября 2019
О РЕШЕНИИ
ПОЛНАЯ ЗАЩИТА РАБОЧЕЙ СТАНЦИИ
Полноценная защита в SandBlast Agent стала возможной благодаря использованию целого ряда уникальных технологий защиты, работающих на разных стадиях атаки. Шифрование данных, VPN, локальный межсетевой экран и Application Control часто позволяют вообще избежать атаки.
В случае, если атака все-таки состоится, Zero-Phishing и URL Filtering ограничат доступ к вредоносным сайтам, Антивирус защитит от известных угроз, а Threat Extraction (мгновенная конвертация файлов в безопасную форму) и Threat Emulation (динамический анализ) заблокируют неизвестные. Набор технологий поведенческого анализа, таких как Anti-Evasion, Anti-Exploit, Anti-Bot, Anti-Ransomware и другие, позволяют отследить и остановить опасную активность.SBA постоянно анализирует поведение системы (операции с файлами и процессами, изменения реестра и сетевые соединения), и сохраняет информацию о событиях локально на жесткий диск.
FORENSIC ANALYSIS — АВТОМАТИЧЕСКОЕ РАССЛЕДОВАНИЕ ИНЦИДЕНТА
Firewall, Application Control, Port Protection, VPN
УМЕНЬШИТЬ ПЛОЩАДЬ АТАКИ
Anti-Virus, Threat Extraction, Threat Emulation, Zero Phishing, FW, Anti-Exploit, NGAV
ПРЕДОТВРАТИТЬ АТАКУ
ОБНАРУЖИТЬ ПО ПОВЕДЕНИЮ И УСТРАНИТЬ ПОСЛЕДСТВИЯ
Behavioral Guard, AEP Anti-Ramsomware, Anti-Evasion,
Threat Hunting, Anti-Fileless, Anti-Bot, Machine Learning
Хроника атаки: последовательность событий, тип атаки, точка входа, индикаторы, текущее состояние, ущерб, MITRE ATT&CK
РАССЛЕДОВАТЬ
И СОСТАВИТЬ ОТЧЕТ
ЗАБЛОКИРОВАТЬ УГРОЗУ
Anti-Bot, FW, Anti-Ransomware, Forensic Remediation, карантин
AEP
EDR
NGAV
ПРЕДОТВРАТИТЬ АТАКУ
Anti-Virus, Threat Extraction, Threat Emulation, Zero Phishing, FW, Anti-Exploit, NGAV
ОБНАРУЖИТЬ ПО ПОВЕДЕНИЮ И УСТРАНИТЬ ПОСЛЕДСТВИЯ
Behavioral Guard, AEP Anti-Ramsomware, Anti-Evasion,
Threat Hunting, Anti-Fileless, Anti-Bot, Machine Learning
ЗАБЛОКИРОВАТЬ УГРОЗУ
Anti-Bot, FW, Anti-Ransomware, Forensic Remediation, карантин
РАССЛЕДОВАТЬ
И СОСТАВИТЬ ОТЧЕТ

Хроника атаки: последовательность событий, тип атаки, точка входа, индикаторы, текущее состояние, ущерб, MITRE ATT&CK
УМЕНЬШИТЬ ПЛОЩАДЬ АТАКИ
Firewall, Application Control, Port Protection, VPN
NSS присвоил SandBlast Agent статус «рекомендовано»
100%
Это 18-ый раз, начиная с 2010 года, когда NSS присваивает нашим продуктам статус «рекомендовано».
Результаты тестирования расширенной защиты рабочих станций (Advanced Endpoint Protection, AEP)
в WEB-траффике
в электронной почте
угроз offline
попыток обхода
без ложного срабатывания
Блокировок
Copyright
DISCLAIMER OF WARRANTY

Check Point Software Technologies Ltd. makes no representation or warranties, either express or implied by or with respect to anything in this document, and shall not be liable for any implied warranties of merchantability or fitness for a particular purpose or for any indirect special or consequential damages.

COPYRIGHT NOTICE

No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, photocopying, recording or otherwise, without prior written consent of Check Point Software Technologies Ltd. No patent liability is assumed with respect to the use of the information contained herein. while every precaution has been taken in the preparation of this publication, Check Point Software Technologies Ltd. assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.

Copyright © Check Point Software Technologies Ltd. All rights reserved

TRADEMARKS

©2003-2020 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point 2200, Check Point 4000 Appliances, Check Point 4200, Check Point 4400, Check Point 4600, Check Point 4800, Check Point 12000 Appliances, Check Point 12200, Check Point 12400, Check Point 12600, Check Point 21400, Check Point 21600,Check Point 21700, Check Point 6100 Security System, Check Point Anti-Bot Software Blade, Check Point Anti-Virus Software Blade,Check Point Application Control Software Blade, Check Point Data Loss Prevention, Check Point DDoS Protector, Check Point DLP, Check Point DLP-1, Check Point Endpoint Security, Check Point Endpoint Security On Demand, Check Point Firewall Software Blade, Check Point Full Disk Encryption, Check Point GAiA, Check Point GO, Check Point Horizon Manager, Check Point Identity Awareness, Check Point IPS, Check Point IPSec VPN, the Check Point logo, Check Point Media Encryption, Check Point Mobile, Check Point Mobile Access, Check Point NAC, Check Point Network Voyager, Check Point OneCheck, Check Point R75, Check Point Secure Web Gateway, Check Point Security Gateway, Check Point Security Gateway Virtual Edition, Check Point Threat Emulation, Check Point Threat Emulation Software Blade, Check Point R76, Check Point Update Service, Check Point URL Filtering Software Blade, Check Point Virtual Systems, Check Point WebCheck, ClusterXL, Compliance Software Blade,Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, DefenseNet, DynamicID, Endpoint Connect VPN Client, Endpoint Security, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, Hacker ID, HackingPoint, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IP Appliances, IP Series Appliances, IPS-1, IPS Software Blade, IPSO, R75, Software Blade, MailSafe, the More, better, Simpler Security logo, Multi-Domain Security Management, MultiSpect, Next Generation Secure Web Gateway, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management,Power-1, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Office, Safe@Office N, SandBlast, Secure Virtual Workspace, SecureClient, SecureClient Mobile, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, SecurityPower, Series 80 Appliance, SiteManager-1, Smart-1, SmartCenter, SmartCenter Power, SmartCenter Pro, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, SmartEvent, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartProvisioning, SmartReporter, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SmartWorkflow, SMP, SMP On-Demand, SocialGuard, SofaWare, Software Blade Architecture, the softwareblades logo, SSL Network Extender, Stateful Clustering, Total Security, the totalsecurity logo, ThreatCloud, Threat Emulation Portal, ThreatSpect,TrueVector, UserCheck, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Edge N, UTM-1 Total Security, VPN-1, VPN-1 Edge, VPN-1 MASS, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VE, VPN-1 VSX, VSX, VSX-1, Web Intelligence, ZoneAlarm, ZoneAlarm Antivirus + Firewall, ZoneAlarm DataLock, ZoneAlarm Extreme Security, ZoneAlarm ForceField, ZoneAlarm Free Firewall, ZoneAlarm Pro Firewall, ZoneAlarm Internet Security Suite, ZoneAlarm Security Toolbar, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, 7,165,076, 7,540,013, 7,725,737 and 7,788,726 and may be protected by other U.S. Patents, foreign patents, or pending applications.

DOWNLOAD AGREEMENT

Any use, access or download of any file, software, document or Software Subscription under the Check Point website and/or User Center is subject to the terms of the Download Agreement.

Please review the Download Agreement terms and conditions.


CHECK POINT PRIVACY POLICY
This Privacy Policy explains how we use the personal information that Check Point collects or generates both in relation to the Check Point website (www.checkpoint.com) and our products and services.

The list below sets out what is covered in this Privacy Policy and you can click on the headings to go to a specific section.

  1. BACKGROUND
  2. THE PRODUCTS AND SERVICES WE PROVIDE
  3. THE TYPES OF PERSONAL DATA WE COLLECT
  4. HOW WE USE YOUR INFORMATION
  5. DISCLOSURE OF YOUR INFORMATION TO THIRD PARTIES
  6. INTERNATIONAL TRANSFERS OF PERSONAL DATA
  7. HOW WE SAFEGUARD YOUR INFORMATION
  8. HOW LONG WE KEEP YOUR PERSONAL DATA
  9. YOUR RIGHTS
  10. DESIGNATED REPRESENTATIVE
  11. QUESTIONS AND CONCERNS
  1. BACKGROUND
    1. Check Point Software Technologies Ltd. with its registered office at 5 Shlomo Kaplan Street, Tel Aviv 67897, Israel (email: privacy_inquiries@checkpoint.com) and other companies in the Check Point group collect and use certain Personal Data. Check Point is responsible for ensuring that it uses that Personal Data in compliance with data protection laws.
    2. At Check Point we respect the privacy of our clients and we are committed to keeping all your Personal Data secure. This Privacy Policy governs the handling of Personal Data by Check Point in the course of carrying on commercial activities.
    3. We use the following definitions in this Privacy Policy:«Check Point», «we» or «us» means Check Point Software Technologies Ltd. and other companies in the Check Point group.«Personal Data» means any data which relates to a living individual who can be identified from that data or from that data and other information which is in the possession of, or is likely to come into the possession of, Check Point (or its representatives or service providers). In addition to factual information, it includes any expression of opinion about an individual and any indication of the intentions of Check Point or any other person in respect of an individual.
  2. THE PRODUCTS AND SERVICES WE PROVIDE
    1. This Privacy Policy concerns the following categories of information that we collect about you when providing the following products and services:
      1. ) Information we receive through our websites (e.g. www.checkpoint.com) («Check Point Websites»);
      2. ) Information we receive through our products («Check Point Products»);
      3. ) Information we receive through our support, mobile security solution or cloud-based services («Check Point Services»).
  3. THE TYPES OF PERSONAL DATA WE COLLECT
    1. Many of the services offered by Check Point require us to obtain Personal Data about you in order to perform the services we have been engaged to provide. In relation to each of the services described at paragraph 2.1 above, we will collect and process the following Personal Data about you:
      • Information that you provide to Check Point. This includes information about you that you provide to us. The nature of the services you are requesting will determine the kind of Personal Data we might ask for, though such information may include (by way of a non-exhaustive list):
        • basic Personal Data (such as first name; family name; position in the company [title]; company name; company email address; business phone number; business address; city; postcode; country);
        • any information that you choose to share on Check Point internet forums which may be considered Personal Data. (Please note that Check Point does not collate information included on Check Point internet forums together with Personal Data from your User Center account or profile);
      • Information that we collect or generate about you. This includes (by way of non-exhaustive list):
        • a file with your contact history to be used for enquiry purposes so that we may ensure that you are satisfied with the services which we have provided to you;
        • through our cloud security services, traffic and security reports that include information on the internet usage of the organization's computer users (e.g. what websites were visited by each user, any documents downloaded, security incidents, prevention measures taken by the gateway, etc.); and
        • activity data relating to the use of protected documents, such as altering a document's permissions and information regarding the individual that performed the activity.
      • Cookies.
        • When you visit Check Point Websites, cookies are used to collect technical information about the services that you use, and how you use them.
        • For more information on the cookies used by Check Point, please see the Check Point Cookies Notice tab on this page.
      • Anonymized data.
        • In addition to the categories of Personal Data described above, Check Point will also process further anonymized information and data that is not processed by reference to a specific individual.
  4. HOW WE USE YOUR INFORMATION
    1. Your Personal Data may be stored and processed by us in the following ways and for the following purposes:
      • for ongoing review and improvement of the information provided on Check Point Websites to ensure they are user friendly and to prevent any potential disruptions or cyber attacks;
      • to allow you to use and access the functionality provided by the Check Point Products;
      • to assess your application for Check Point Products, where applicable;
      • to set up customers to use Check Point Products;
      • to set up users to use the User Center;
      • to conduct analysis required to detect malicious data and understand how this may affect your IT system;
      • for statistical monitoring and analysis of current attacks on devices and systems and for the on-going adaptation of the solutions provided to secure devices and systems against current attacks;
      • to understand feedback on Check Point Products and to help provide more information on the use of those products and services quickly and easily;
      • to communicate with you in order to provide you with services or information about Check Point and Check Point Products;
      • for in-depth threat analysis;
      • to understand your needs and interests;
      • for the management and administration of our business;
      • in order to comply with and in order to assess compliance with applicable laws, rules and regulations, and internal policies and procedures; or
      • for the administration and maintenance of databases storing Personal Data
      • to market Check Point's products and services.
    2. However we use Personal Data we make sure that the usage complies with law and the law allows us and requires us to use Personal Data for a variety of reasons. These include:
      • we need to do so in order to perform its contractual obligations with its customers;
      • we have obtained your consent;
      • we have legal and regulatory obligations that we have to discharge;
      • we may need to do so in order to establish, exercise or defend our legal rights or for the purpose of legal proceedings;
      • the use of your Personal Data as described is necessary for our legitimate business interests, such as:
        • allowing us to effectively and efficiently manage and administer the operation of our business;
        • maintaining compliance with internal policies and procedures;
        • monitoring the use of our copyrighted materials;
        • enabling quick and easy access to information on Check Point Products;
        • offering optimal, up-to-date security solutions for mobile devices and IT systems; and
        • obtaining further knowledge of current threats to network security in order to update our security solutions and provide these to the market.
    3. We will take steps to ensure that the Personal Data is accessed only by employees of Check Point that have a need to do so for the purposes described in this Privacy Policy.
  5. DISCLOSURE OF YOUR INFORMATION TO THIRD PARTIES
    1. We may share your Personal Data within the Check Point group of companies for the purposes described above.
    2. We may also share your Personal Data outside of the Check Point group for the following purposes:
      • with our business partners. For example, this could include our partners from whom you or your company or your organization purchased the Check Point product(s). Personal Data will only be transferred to a business partner who is contractually obliged to comply with appropriate data protection obligations and the relevant privacy and confidentiality legislation;
      • with third party agents and contractors for the purposes of providing services to us (for example, Check Point's accountants, professional advisors, IT and communication and marketing providers and debt collectors). These third parties will be subject to appropriate data protection obligations and they will only use your Personal Data as described in this Privacy Policy;
      • to the extent required by law, for example if we are under a duty to disclose your Personal Data in order to comply with any legal obligation (including, without limitation, in order to comply with tax reporting requirements and disclosures to regulators), or to establish, exercise or defend its legal rights;
      • if we sell our business or assets, in which case we may need to disclose your Personal Data to the prospective buyer for due diligence purposes; and
      • if we are acquired by a third party, in which case the Personal Data held by us about you will be disclosed to the third party buyer.
  6. INTERNATIONAL TRANSFERS OF PERSONAL DATA
    1. Check Point is a global business. Our customers and our operations are spread around the world. As a result, we collect and transfer Personal Data on a global basis. That means that we may transfer your Personal Data to locations outside of your country.
    2. Where we transfer your Personal Data to another country outside the EEA, we will ensure that it is protected and transferred in a manner consistent with legal requirements. In relation to data being transferred outside of Europe, for example, this may be done in one of the following ways:
      • the country that we send the data to might be approved by the European Commission as offering an adequate level of protection for Personal Data (Israel is an approved country);
      • the recipient might have signed up to a contract based on «model contractual clauses» approved by the European Commission, obliging them to protect your Personal Data;
      • where the recipient is located in the US, it might be a certified member of the EU-US Privacy Shield scheme; or
      • in other circumstances the law may permit us to otherwise transfer your Personal Data outside Europe.
    3. You can obtain more details of the protection given to your Personal Data when it is transferred outside Europe (including a copy of the standard data protection clauses which we have entered into with recipients of your Personal Data) by contacting us as described in paragraph 11 below.
  7. HOW WE SAFEGUARD YOUR INFORMATION
    1. We have extensive controls in place to maintain the security of our information and information systems. Client files are protected with safeguards according to the sensitivity of the relevant information. Appropriate controls (such as restricted access) are placed on our computer systems. Physical access to areas where Personal Data is gathered, processed or stored is limited to authorized employees.
    2. As a condition of employment, Check Point employees are required to follow all applicable laws and regulations, including in relation to data protection law. Access to sensitive Personal Data is limited to those employees who need to it to perform their roles. Unauthorized use or disclosure of confidential client information by a Check Point employee is prohibited and may result in disciplinary measures.
    3. When you contact a Check Point employee about your file, you may be asked for some Personal Data. This type of safeguard is designed to ensure that only you, or someone authorized by you, has access to your file.
  8. HOW LONG WE KEEP YOUR PERSONAL DATA
    1. How long we will hold your Personal Data for will vary and will be determined by the following criteria:
      • the purpose for which we are using it – Check Point will need to keep the data for as long as is necessary for that purpose; and
      • legal obligations – laws or regulation may set a minimum period for which we have to keep your Personal Data.
  9. YOUR RIGHTS
    1. In all the above cases in which we collect, use or store your Personal Data, you may have the following rights and, in most cases, you can exercise them free of charge. These rights include:
      • the right to obtain information regarding the processing of your Personal Data and access to the Personal Data which we hold about you;
      • the right to withdraw your consent to the processing of your Personal Data at any time. Please note, however, that we may still be entitled to process your Personal Data if we have another legitimate reason for doing so. For example, we may need to retain Personal Data to comply with a legal obligation;
      • in some circumstances, the right to receive some Personal Data in a structured, commonly used and machine-readable format and/or request that we transmit those data to a third party where this is technically feasible. Please note that this right only applies to Personal Data which you have provided directly to Check Point;
      • the right to request that we rectify your Personal Data if it is inaccurate or incomplete;
      • the right to request that we erase your Personal Data in certain circumstances. Please note that there may be circumstances where you ask us to erase your Personal Data but we are legally entitled to retain it;
      • the right to request that we restrict our processing of your Personal Data in certain circumstances. Again, there may be circumstances where you ask us to restrict our processing of your Personal Data but we are legally entitled to refuse that request; and
      • the right to lodge a complaint with the relevant data protection regulator if you think that any of your rights have been infringed by us.
    2. You can exercise your rights by contacting us using the details listed in paragraph 11 below.
  10. DESIGNATED REPRESENTATIVE
    1. Check Point's registered office may be contacted using the following contact information:
      Address: Check Point Software Technologies Ltd.,
      5 Shlomo Kaplan Street,
      Tel Aviv 67897,
      Israel
      Attention: Legal Department Email Address: privacy_inquiries@checkpoint.com
    2. Check Point's designated representative in the EU may be contacted using the following contact information:
      Address: Check Point Software Technologies GmbH,
      Zeppelinstraße 1,
      85399
      Hallbergmoos,
      Germany Email Address: contact-germany@checkpoint.com
  11. QUESTIONS AND CONCERNS
    1. If you have any questions or concerns about Check Point's handling of your Personal Data, or about this Policy, please contact our Privacy Officer using the following contact information:
      Address: Check Point Software Technologies Ltd.,
      5 Shlomo Kaplan Street,
      Tel Aviv 67897,
      Israel
      Attention: Legal Department Email Address: privacy_inquiries@checkpoint.com We are usually able to resolve privacy questions or concerns promptly and effectively. If you are not satisfied with the response you receive from our Privacy Officer, you may escalate concerns to the applicable privacy regulator in your jurisdiction. Upon request, Check Point's Privacy Officer will provide you with the contact information for that regulator.


ЗАПРОСИТЬ ДЕМО
нажимая на кнопку вы соглашаетесь с политикой конфиденциальности
ЗАПРОСИТЬ СТОИМОСТЬ
нажимая на кнопку вы соглашаетесь с политикой конфиденциальности
ЗАГРУЗИТЬ ОТЧЕТ
нажимая на кнопку вы соглашаетесь с политикой конфиденциальности
ВИРТУАЛЬНЫЙ ДЕМО-ДЕНЬ
SANDBLAST AGENT
Приглашаем вас на виртуальный демо-день! Мы не будем отнимать у вас время на пустые слова и обещания. А дадим возможность самостоятельно протестировать решение, выполнить лабораторные работы, а понять что же такое SandBlast Agent. После регистрации мы пришлем ближайшие доступные даты для вашего выбора. А после подтверждения с вашей стороны - персональную ссылку на зум с паролем для подключения.
Чтобы принять участие в виртуальном демо-дне пожалуйста заполните форму.
РЕГИСТРАЦИЯ
Регистрируясь Вы соглашаетесь
с политикой обработки персональных данных
ПАКЕТЫ ПОСТАВКИ
Централизованное развертывание и управление*
Access Control, Port Protection, VPN
Антивирус следующего поколения (NGAV)**
Firewall, Application Control, Port Protection, VPN
Zero-Phishing, URL Filtering
Endpoint Detect and Response (Forensic Analysis)
Threat Emulation and Extraction
Защита данных (Full Disk Encryption and Media Encryption)
ФУНКЦИОНАЛ/КОНФИГУРАЦИЯ SBA
BASIC
ADVANCED
COMPLETE
* Все пакеты управляются с помощью платформы управления SmartEndpoint, развернутой локально или в облаке
**Все пакеты SBA могут как интегрироваться с существующим Антивирусом, так и полностью его заменить за счет встроенного антивирусного движка
SECURE YOUR EVERYTHING
Check Point Software Technologies Ltd., 1994–2020 Все права защищены.
Сведения об авторском праве | Конфиденциальность