SANDBOX SOLUTIONS

The most popular way to distribute malicious code is through malicious alterations. Within the active part of the well-known file formats, malicious content is silenced, and the user, without knowing that he is infected, launches a modified document, launches a malicious code in the background.

About solutions

A traditional network security model based on post-infection technologies, such as antivirus and IPS, proved to be insufficient to protect against zero-day threats. Adequate protection against malicious alterations can only be achieved by emulation, or by running documents in a controlled environment to verify that they contain an active malware component. This solution in the world is known as sandboxing technology.

Check Point SandBlast

Using the unique processor-level detection mechanism, with innovative ThreatEmulation and ThreatExtraction technologies, the Check Point SandBlast solution raises protection against known and unknown threats to a higher level. Detection of file behavior during execution at CPU level instructions allows users to stay protected against the most dangerous zero-day attacks; technology to avoid the sandbox solution here has no chance.

With its unique Threat Emulation technology, the Check Point SandBlast solution has the highest possible level of zero-day threat detection, as confirmed by independent research companies (NSS LAB, Gartner, Miercom, Forrester Wave). The time required to emulate files is less than 3 minutes. SandBlast Threat Extraction technology complements Threat Emulation technology by delivering instantaneous content, cleaned from the active parts of a potentially malicious file, while reducing the time required for file emulation. For many reasons it can be produced

Trend Micro

Uz Trend Micro je celovita zaštita od računarskih pretnji i gubitka informacija dostupna i malim i srednjim preduzećima. Trend Micro omogućava jednostavno pokrivanje dve kritične tačke: e‑mail saobraćaj, putem kojeg se danas isporučuje najviše ransomware pretnji, i korisničke računare, kao krajnji cilj malicioznih napada.

Worry‑Free Services Advanced paket kompanije Trend Micro sadrži tri ključne stavke: zaštitu za Windows i Mac, te iOS i Android mobilne uredjaje (proizvod Worry‑Free Services), bezbednost mail‑a sa antispam, antimalware i naprednom ransomware zaštitom (Hosted Email Security), te, za sve Office 365 korisnike, dodatnu zaštitu i DLP za mail, OneDrive i Sharepoint servise (Cloud App Security).

Worry‑Free Services proizvod nudi standardnu antimalware zaštitu, blokiranje malicioznih aplikacija kroz heurističku analizu njihovog ponašanja, kontrolu perifernih uredjaja, filtriranje na osnovu web reputacije, filtriranje po kategoriji sadržaja, te u poslednje vreme i prediktivno mašinsko učenje (XGen predictive machine learning). Dodatno, funkcionalnosti za zaštitu od ransomware‑a blokiraju crypto‑malware procese, štite dokumente od neautorizovane enkripcije i vrše backup kriptovanih dokumenata.

Contact us

Who are you and how can we help you?

Name and surname (required field)

Email address (required field)

Company (required field)

Contact phone

Ask a question

Comments
Coming Computer Engineering

Kompanija COMING – Computer Engineering d.o.o. osnovana je 1991. godine sa ciljem da kreira, razvija, implementira, prodaje i pruža usluge podrške IT sistema, kako bi izašla u susret potrebama i zahtevima klijenata i tržišta.