零時差防護

Threat Extraction
Content Disarm and Reconstruction (CDR)

Threat Extraction removes risky features from files such as macros, embedded objects and more, rather than determining their maliciousness. By cleaning the file before it enters the organization. Threat Extraction preemptively prevents both known and unknown threats, providing better protection against zero-day attacks.

Benefits of Threat Extraction

Content Disarm and Reconstruction (CDR)

Check Point Threat Extraction technology offers an industry-leading Content Disarm and Reconstruction (CDR) solution. Threat Extraction provides several benefits for organizational cybersecurity and employee productivity, including:

 

TE 樣機 0

Minimal Recipient Impact
Any malicious content is designed to be invisible to the recipient, so CDR has no impact on actual information conveyed by the file.

Safe Delivery
By removing the executable content from the document, the file becomes safe for the recipient, making it possible to send it on to them without risking malware delivery.

Zero Day Protection
CDR removes executable content whether or not it is detected as malicious. This enables it to protect against zero-day threats.

Rapid Delivery
CDR eliminates delays associated with traditional sandboxes and enables real-world deployment for zero-day protection in prevent mode, while delivering cleaned files to users quickly.

Original File Access
In some cases, access to executable content may be required for benign files. With Check Point Threat Extraction, the original file may be accessed by the user after it is confirmed to be benign after sandbox inspection.

×
  反映意見
由於 Cookie 有其功能且可供我們用於資料分析和行銷等相關業務,本網站是有使用 Cookie 的。繼續瀏覽本網站即表示您同意我們使用 Cookie。若欲了解更多相關資訊,請參閱我們的 Cookie 聲明