Check Point SandBlast
- Days: 1 Day
- Detailed Agenda (PDF)
Zero-day and advanced persistent threats use the element of surprise to bypass traditional security, making these threats difficult to protect against—and very popular with hackers. Traditional sandboxing was designed to help with these types of threats, but cybercriminals have evolved their techniques, creating evasive malware that can avoid detection by many sandbox solutions. As a result, many organizations find themselves taking reactive steps to counteract infection, rather than preventing it in the first place.To get ahead, enterprises need a multi-faceted prevention strategy that combines proactive protection that eliminates threats before they reach users, and state-of-the-art CPU-level exploit detection to expose even the most highly camouflaged threats.
- Threat Anatomy
- SandBlast Threat Emulation
- SandBlast Threat Extraction
- ThreatCloud Emulation Service
- Deployment Scenarios
- SandBlast Troubleshooting
Course GoalsProvide an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology
Course AgendaLAB EXERCISES
- Learn about software vulnerabilities.
- Understand the CVSS scores for vulnerabilities.
- See how malware can bypass sandboxing.
- Activate local emulation and make the system ready to emulate files.
- Use the command line to emulate files from the local file system.
- View Threat Emulation logs using SmartView Tracker.
- View and create reports using SmartEvent.
- Confirm the Security Gateway acts as an MTA.
- Activate Threat Extraction on an MTA-enabled Security Gateway.
- Confirm how Threat Extraction delivers safe content.
- Identify how to configure Security Gateway to offload file emulation to ThreatCloud.
- Review the related forensic report.
Please call 312-726-2473 for more information.