This document discusses threat emulation technology from Check Point. It begins by explaining the concept of known knowns, known unknowns, and unknown unknowns when it comes to cyber threats. It then discusses how existing prevention tools like IPS and antivirus address known threats but cannot detect new unknown threats. The document introduces Check Point's threat emulation solution, which dynamically analyzes suspicious files in virtual machines to detect abnormal behavior indicating potential threats, even for unknown threats that evade signature-based detection. It provides examples of how threat emulation detected the Syrian Ministry of Foreign Affairs attack. The document discusses deployment options and architecture of Check Point's threat emulation solution.