SlideShare a Scribd company logo
©2016 Check Point Software Technologies Ltd. All rights reserved.
January 12, 2016
How to Choose your Next Sandboxing Solution | White Paper
1
HOW TO CHOOSE YOUR NEXT SANDBOXING
SOLUTION
FEATURING INSIGHT FROM GARTNER’S MARKET GUIDE FOR
NETWORK SANDBOXING
With several sandboxing solutions available in the market today, how do you go about choosing the one that’s right for your
organization? On March 2, 2015, Gartner published the “Market Guide for Network Sandboxing” geared at providing guidance to
organizations looking to prevent the most sophisticated unknown malware from compromising their systems and networks.
In this paper, we will present the key points of the Gartner research, and then discuss how we feel Check Point solutions are
meeting those requirements today.
In Gartner Predicts 2015: Infrastructure Protection, Gartner states that "By 2018, 85% of new deals for network sandboxing
functionality will be packaged with network firewall and content security platforms"
1
We believe the reason behind this statement is clear—there is an inherent desire to minimize the number of separate security
products an organization must deploy, consolidate the security alerts into fewer and more consistent screens, and integrate and
correlate the alerts into one meaningful dashboard. Because of this, network firewall gateways with their out-of-the-box visibility to
network traffic are the ideal platform to offer the best sandboxing security services to organizations.
Checkpoint has been recognized in the top right quadrant of the Gartner Magic Quadrant for Enterprise Network Firewalls for t he
past 18 years
2
and continues to be a leader in the threat prevention market by offering the best sandboxing technology available
that follows Gartner’s guidelines.
MARKET SEGMENTATION
According to Gartner, the market for network sandboxing consists of 3 categories
3
. And in this section we will discuss how the
Check Point sandbox solution, Threat Emulation, can support deployment models across all three of Gartner’s categories for
network sandboxing. The first two categories Gartner describes are:
1. Sandboxing as a feature of firewalls, IPS and UTM solutions and
2. Sandboxing as a feature of secure web gateways or secure email gateways
Check Point’s sandbox solution, Threat Emulation, is integrated with Check Point gateways running Firewall/IPS/UTM, as well as
the Check Point Secure Web Gateways:
Using dedicated Threat Emulation appliances (aka Private Cloud) or the Threat Emulation cloud service, Check Point Security
Gateways sends files and objects from across the network to the Threat Emulation sandbox. This option allows customers to add
sandboxing capability for protection from advanced and zero-day threats to their existing network security and management
infrastructure. For customers using our Cloud sandboxing option, no additional hardware is required beyond the existing firewall
gateways, making deployment very easy, quick, and cost effective.
©2016 Check Point Software Technologies Ltd. All rights reserved.
January 12, 2016
How to Choose your Next Sandboxing Solution | White Paper
2
Both our cloud-based and on premise Threat Emulation sandbox options include full threat prevention capabilities deployable
inline, on a SPAN port, and as an email relay (MTA). Threat Emulation supports scanning web, email, and file-share traffic, and a
single dedicated appliance on premise can manage both email and web traffic.
Coupled with our market-leading management, Check Point Threat Emulation offers built-in SSL inspection and identity awareness.
In addition to the sandbox function, Threat Emulation can be purchased with Anti-Bot for detection of infected hosts, as well as
Antivirus and Check Point Threat Extraction for delivering clean files immediately.
3. A stand-alone sandboxing solution
Check Point Threat Emulation can be deployed as a stand-alone solution in three different modes:
 With only Threat Emulation blades activated, send files for cloud emulation
 With only Threat Emulation blades activated, send files for local emulation on dedicated appliances
 Hardware free implementation—We also offer configuration, set up, management, and sandboxing services fully hosted in the cloud.
Customers only need to point their email and/or web traffic to our Capsule Cloud, and benefit immediately from the same protection
available in the deployment scenarios described above.
With this range of deployment options, we believe Check Point Threat Emulation, spans all three of Gartner’s categories for
network sandboxing. This solution provides customers with the flexibility to either inspect files in the cloud or on premise using our
Threat Emulation Appliances.
SANDBOXING BACKGROUND
According to Gartner, network-based sandboxing relies on ‘sensors’ that monitor network traffic and then submit suspicious objects
to the ‘sandbox’ for payload analysis
4
. Suspicious files are flagged while minimizing false positives. Only in the last few years has
sandboxing been deployable in the broader market utilizing current security skillsets and offering the capabilities described by
Gartner, below. But this basic functionality still has limitations.
Offered by many vendors, traditional OS-level sandboxing is often slow, subject to many successful evasion techniques, incapable
of blocking some sophisticated attacks, and can only be evaluated once the malware is already active. By being the first to
introduce CPU-level sandboxing, Check Point delivers a solution beyond the traditional OS-level sandboxing. Faster, evasion-
resistant CPU-level threat emulation addresses the ‘pre-infection’ stage by analyzing the malware’s impact on the CPU and
memory. With the combination of both OS-level and CPU-level sandboxing detection and blocking, we provide the highest level of
zero-day protection, an unmatched level of security against even the most sophisticated attacks. In addition, our mobile solution
extends this real-time protection to both iOS and Android users.
SANDBOXING CAPABILITIES TO LOOK FOR
The quality of sandboxing solutions varies widely. According to Gartner, some critical capabilities to look for in your next
sandboxing solution include:
1. “The ability to analyze a broad range of suspicious objects
5
”
Check Point Threat Emulation identifies malware across a broad range of the most common document types used in
organizations today, including:
 Adobe Acrobat (PDF)
 Adobe Flash (SWF)
 Archive (TAR, ZIP, RAR and Seven-Z)
 General (EXE, RTF, CSV and SCR)
 Java (JAR)
 Microsoft Office Package
 Microsoft Excel (XLS, XLSX, XLT, XLM, XLTX, XLSM, XLTM, XLSB, XLA, XLAM, XLL and XLW)
 Microsoft PowerPoint (PPT, PPTX, PPS, PPTM, POTX, POTM, PPAM, PPSX, PPSM, SLDX and SLDM)
 Microsoft Word (DOC, DOCX, DOT, DOCM, DOTX, DOTM)
 Word Processing (HWP)
©2016 Check Point Software Technologies Ltd. All rights reserved.
January 12, 2016
How to Choose your Next Sandboxing Solution | White Paper
3
2. “Static analysis and other pre-filtering techniques
6
”
Check Point offers a multi-layered threat prevention strategy, using IPS, Antivirus, Anti-Bot, OS-level Threat Emulation, CPU-
level Threat Emulation, Threat Extraction, and Threat Intelligence. Our IPS, Antivirus, and Anti-Bot solutions help filter out
known threats, while Threat Emulation and Threat Extraction provide protection against new and unknown threats.
Check Point leverages multiple pre-emulation engines to minimize the number of objects sent to the sandbox. We utilize
advanced machine learning engines for executable files and various signature-based Antivirus engines. Static analysis
evaluates and identifies malware without requiring sandbox analysis. In addition, we reduce sandboxing sessions by caching
files sent through multiple channels of attack on the gateways, on the Threat Emulation appliance and on the cloud service. As
new threats are confirmed as malware, updates are provided to static filtering engines in real-time.
3. “Comprehensive operating system and application stack
7
”
Check Point Threat Emulation provides multiple simultaneous simulation environments for sandboxing: Windows XP, 7,
Microsoft Office, Adobe environments, and custom images. In addition to this, our upcoming capability of CPU-level Threat
Emulation is OS agnostic and can detect threats based on instruction level behavior on any x86 Operating System.
Preventing advanced threats on mobile platforms requires a holistic approach that is focused on the unique aspects of these
platforms. Covering both iOS and Android, we offer the industry’s most advanced Mobile Threat Prevention solution. With the
highest advanced threat catch-rate for enterprise-grade mobile security platforms, we secure the entire mobile device.
4. “Anti-evasion technologies
8
”
Traditional OS-level sandbox technology is based upon behavioral analysis within the operating system. Due to this, traditional
sandboxing faces a major challenge when it comes to constantly improving evasion techniques. Our CPU-Level sandboxing
detects vulnerability exploitations before the attacker has an opportunity to execute any code or evade detection. This extends
Check Point Threat Emulation solution beyond even the customized hypervisors supported at the OS-level to provide the most
advanced zero-day solution available.
5. “The rate at which objects can be analyzed in the sandbox
9
”
Check Point offers its Threat Emulation sandbox in two forms:
a. Threat Emulation Cloud Service: This cloud service provides a scalable solution without requiring the customer to
deploy additional infrastructure. Built to withstand high peak usage, it provides a highly available global service.
b. Threat Emulation (TE) appliance: We provide a wide range of Threat Emulation appliances for on premise
sandboxing. Rated by the monthly number of sandboxing sessions, they range from 250K to 2 million sandbox
sessions per month. The appliances’ design withstands typical peak traffic. If the emulation capacity is exceeded it
queues files and objects. With our gateways, customers can send files and objects across their network to the TE
appliance for sandboxing. By creating an array of TE appliances load-balanced by our gateways, this solution easily
scales to any volume without the need for a third-party load-balancer.
6. “A combination of virtualization-based and emulation-based sandboxing analysis
10
”
We focus our sandbox approach on the providing the best methods of threat detection while preserving both performance and
efficiency. With virtualization-based approaches, we provide exceptional performance compared to solely emulation-based
approaches. With the combination of our CPU-Level technology and the actions we perform within virtualization, we provide
the best of both of the approaches.
7. “Contextual information about the malware or targeted attack
11
”
Our Threat Emulation solution works hand in hand with ThreatCloud
™
, our threat intelligence database. ThreatCloud™
leverages threat feeds from all of our customers and many threat intelligence partners. Every time Threat Emulation marks a
file as malicious, it adds this information to the ThreatCloud
™
database. In addition, through Check Point’s management and
©2016 Check Point Software Technologies Ltd. All rights reserved.
January 12, 2016
How to Choose your Next Sandboxing Solution | White Paper
4
SmartEvent, customers gain complete visibility into their network. Customized reports of events pointing at the sources,
destinations, services, and type of attacks help determine whether attacks are targeted or not.
8. “Integration with forensics tools
12
”
Our Endpoint Forensics solution provides detailed insight for detections found on the network and the endpoint. Coupled with
complete forensic information, it provides a complete analysis highlighting how the attack entered the organization, damage
occurred, command and control communications, lateral movement, and more. This information allows it to automatically
identify all hosts with the same infection. Additionally, we offer a tie-in between Threat Emulation and Bit 9's Carbon Black,
enabling 2-way transfer of zero-day malware information at the endpoint.
SUMMARY
Gartner recommends that “if your organization is budget-constrained or looking for a quick path to add sandboxing, first evaluate
adding sandboxing as a feature from one of your current security vendors.
13
” And “If budget permits, or when targeted malware is
identified as a high risk, evaluate stand-alone sandboxing solutions.
14
” At Check Point, we offer both.
For customers looking for the best stand-alone solution we provide three alternate implementations based on a dedicated and
comprehensive solution. These solutions range from a zero-hardware approach to an on-premise Threat Emulation appliance.
Bundled with a full stack of threat prevention technologies, they also include our unique CPU-Level sandboxing and innovative
Threat Extraction capabilities. The solutions integrate with Check Point’s leading intelligence—ThreatCloud
™
, and the only open
marketplace for cyber-intelligence—IntelliStore
™
. Our solution covers the Incident Response process, including SmartEvent—our
visualization and investigation platform, Endpoint Forensics, and the ability to detect and block infected hosts with Anti-Bot.
For the budget-conscious customers, we provide a state-of-the-art advanced threat protection solution that seamlessly
integrates with existing security, secure web gateways, and management to send files and objects either to the Threat Emulation
cloud service or to an on-premise Threat Emulation appliance.
Check Point Threat Emulation meets all the criteria provided by Gartner for an effective sandboxing solution. We provide the only
sandboxing solution that combines the power of CPU-level and OS-level protection to detect and block malware, and to prevent
infections from undiscovered exploits, zero-day, and targeted attacks.
Check Point’s Threat Emulation is only one part of our comprehensive end-to-end portfolio spanning next-generation threat
protection, mobile security, next-generation firewalls, security management, and much more.
Evaluate Threat Emulation today—http://www.checkpoint.com/try-our-products/
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the
highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact.
Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
4 “Market Guide for Network Sandboxing,” page 1, Gartner, 2 March 2015
5 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015
6 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015
7 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015
8 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015
9 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015
10 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015
11 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015
12 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015
13 “Market Guide for Network Sandboxing,” page 5, Gartner, 2 March 2015
14 “Market Guide for Network Sandboxing,” page 5, Gartner, 2 March 2015

More Related Content

What's hot

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
MarketingArrowECS_CZ
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR ModernizationApache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
Kai Wähner
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
danb02
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
ErikHof4
 
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdfBypass_AV-EDR.pdf
Bypass_AV-EDR.pdf
Farouk2nd
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
DNIF
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
Larry Vandenaweele
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
LogRhythm
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
clevernetsystemsgeneva
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
Exclusive Networks ME
 
A5-Security misconfiguration-OWASP 2013
A5-Security misconfiguration-OWASP 2013   A5-Security misconfiguration-OWASP 2013
A5-Security misconfiguration-OWASP 2013
Sorina Chirilă
 

What's hot (20)

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR ModernizationApache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdfBypass_AV-EDR.pdf
Bypass_AV-EDR.pdf
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
 
A5-Security misconfiguration-OWASP 2013
A5-Security misconfiguration-OWASP 2013   A5-Security misconfiguration-OWASP 2013
A5-Security misconfiguration-OWASP 2013
 

Viewers also liked

Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Michael Bunn
 
McAfee Иммунная система [ATD + TIE]
McAfee Иммунная система [ATD + TIE]McAfee Иммунная система [ATD + TIE]
McAfee Иммунная система [ATD + TIE]
Vladyslav Radetsky
 
Cloud Sandboxing Solution for Cyber Ranges
Cloud Sandboxing Solution for Cyber RangesCloud Sandboxing Solution for Cyber Ranges
Cloud Sandboxing Solution for Cyber Ranges
QualiQuali
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicBlue Coat
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA InfographicBlue Coat
 
Защита данных безнеса с помощью шифрования
Защита данных безнеса с помощью шифрованияЗащита данных безнеса с помощью шифрования
Защита данных безнеса с помощью шифрования
Vladyslav Radetsky
 
McAfee Endpoint Security 10.1
McAfee Endpoint Security 10.1McAfee Endpoint Security 10.1
McAfee Endpoint Security 10.1
Vladyslav Radetsky
 
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
Vladyslav Radetsky
 
DLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечекDLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечек
Vladyslav Radetsky
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
Burak DAYIOGLU
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
Blue Coat
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
Blue Coat
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
Moti Sagey מוטי שגיא
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
RapidSSLOnline.com
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
Group of company MUK
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
Group of company MUK
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
Group of company MUK
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
Moti Sagey מוטי שגיא
 

Viewers also liked (20)

Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014
 
McAfee Иммунная система [ATD + TIE]
McAfee Иммунная система [ATD + TIE]McAfee Иммунная система [ATD + TIE]
McAfee Иммунная система [ATD + TIE]
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Cloud Sandboxing Solution for Cyber Ranges
Cloud Sandboxing Solution for Cyber RangesCloud Sandboxing Solution for Cyber Ranges
Cloud Sandboxing Solution for Cyber Ranges
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 
Защита данных безнеса с помощью шифрования
Защита данных безнеса с помощью шифрованияЗащита данных безнеса с помощью шифрования
Защита данных безнеса с помощью шифрования
 
McAfee Endpoint Security 10.1
McAfee Endpoint Security 10.1McAfee Endpoint Security 10.1
McAfee Endpoint Security 10.1
 
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
Атаки на критичну інфраструктуру України. Висновки. Рекомендації.
 
DLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечекDLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечек
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 

Similar to How to Choose a SandBox - Gartner

Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
David Waugh
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016
Amazon Web Services
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelled
losalamos
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Benelux
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
SofiaCarter4
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
Amazon Web Services
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
NBBNOC
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
Mustafa YÜKSEL
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
Simplex
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
Meta sploit (cyber security)
Meta sploit (cyber security)  Meta sploit (cyber security)
Meta sploit (cyber security)
Rajal Patel
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
Jeremiah Grossman
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
SonaliG6
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesAmit Kumbhar
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
SonaliG6
 

Similar to How to Choose a SandBox - Gartner (20)

Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelled
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
 
MBESProductSheet (1)
MBESProductSheet (1)MBESProductSheet (1)
MBESProductSheet (1)
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
Meta sploit (cyber security)
Meta sploit (cyber security)  Meta sploit (cyber security)
Meta sploit (cyber security)
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 

More from Moti Sagey מוטי שגיא

CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdfCPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
Moti Sagey מוטי שגיא
 
Why Check Point - Top 4 Facts
Why Check Point  - Top 4 FactsWhy Check Point  - Top 4 Facts
Why Check Point - Top 4 Facts
Moti Sagey מוטי שגיא
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
Moti Sagey מוטי שגיא
 
Why check point win top 4 facts
Why check point win   top 4 factsWhy check point win   top 4 facts
Why check point win top 4 facts
Moti Sagey מוטי שגיא
 
Why Check Point - Moti Sagey
Why Check Point - Moti SageyWhy Check Point - Moti Sagey
Why Check Point - Moti Sagey
Moti Sagey מוטי שגיא
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
Moti Sagey מוטי שגיא
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
Moti Sagey מוטי שגיא
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
Moti Sagey מוטי שגיא
 
Why Check Point - Top 4
Why Check Point - Top 4Why Check Point - Top 4
Why Check Point - Top 4
Moti Sagey מוטי שגיא
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
Moti Sagey מוטי שגיא
 
Cyber Security Coverage heat map
Cyber Security Coverage heat map Cyber Security Coverage heat map
Cyber Security Coverage heat map
Moti Sagey מוטי שגיא
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
Moti Sagey מוטי שגיא
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey מוטי שגיא
 
Ecosystem
EcosystemEcosystem
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
Moti Sagey מוטי שגיא
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
 

More from Moti Sagey מוטי שגיא (18)

CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdfCPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
 
Why Check Point - Top 4 Facts
Why Check Point  - Top 4 FactsWhy Check Point  - Top 4 Facts
Why Check Point - Top 4 Facts
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Why check point win top 4 facts
Why check point win   top 4 factsWhy check point win   top 4 facts
Why check point win top 4 facts
 
Why Check Point - Moti Sagey
Why Check Point - Moti SageyWhy Check Point - Moti Sagey
Why Check Point - Moti Sagey
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
Why Check Point - Top 4
Why Check Point - Top 4Why Check Point - Top 4
Why Check Point - Top 4
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Cyber Security Coverage heat map
Cyber Security Coverage heat map Cyber Security Coverage heat map
Cyber Security Coverage heat map
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 

Recently uploaded

Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 

Recently uploaded (20)

Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 

How to Choose a SandBox - Gartner

  • 1. ©2016 Check Point Software Technologies Ltd. All rights reserved. January 12, 2016 How to Choose your Next Sandboxing Solution | White Paper 1 HOW TO CHOOSE YOUR NEXT SANDBOXING SOLUTION FEATURING INSIGHT FROM GARTNER’S MARKET GUIDE FOR NETWORK SANDBOXING With several sandboxing solutions available in the market today, how do you go about choosing the one that’s right for your organization? On March 2, 2015, Gartner published the “Market Guide for Network Sandboxing” geared at providing guidance to organizations looking to prevent the most sophisticated unknown malware from compromising their systems and networks. In this paper, we will present the key points of the Gartner research, and then discuss how we feel Check Point solutions are meeting those requirements today. In Gartner Predicts 2015: Infrastructure Protection, Gartner states that "By 2018, 85% of new deals for network sandboxing functionality will be packaged with network firewall and content security platforms" 1 We believe the reason behind this statement is clear—there is an inherent desire to minimize the number of separate security products an organization must deploy, consolidate the security alerts into fewer and more consistent screens, and integrate and correlate the alerts into one meaningful dashboard. Because of this, network firewall gateways with their out-of-the-box visibility to network traffic are the ideal platform to offer the best sandboxing security services to organizations. Checkpoint has been recognized in the top right quadrant of the Gartner Magic Quadrant for Enterprise Network Firewalls for t he past 18 years 2 and continues to be a leader in the threat prevention market by offering the best sandboxing technology available that follows Gartner’s guidelines. MARKET SEGMENTATION According to Gartner, the market for network sandboxing consists of 3 categories 3 . And in this section we will discuss how the Check Point sandbox solution, Threat Emulation, can support deployment models across all three of Gartner’s categories for network sandboxing. The first two categories Gartner describes are: 1. Sandboxing as a feature of firewalls, IPS and UTM solutions and 2. Sandboxing as a feature of secure web gateways or secure email gateways Check Point’s sandbox solution, Threat Emulation, is integrated with Check Point gateways running Firewall/IPS/UTM, as well as the Check Point Secure Web Gateways: Using dedicated Threat Emulation appliances (aka Private Cloud) or the Threat Emulation cloud service, Check Point Security Gateways sends files and objects from across the network to the Threat Emulation sandbox. This option allows customers to add sandboxing capability for protection from advanced and zero-day threats to their existing network security and management infrastructure. For customers using our Cloud sandboxing option, no additional hardware is required beyond the existing firewall gateways, making deployment very easy, quick, and cost effective.
  • 2. ©2016 Check Point Software Technologies Ltd. All rights reserved. January 12, 2016 How to Choose your Next Sandboxing Solution | White Paper 2 Both our cloud-based and on premise Threat Emulation sandbox options include full threat prevention capabilities deployable inline, on a SPAN port, and as an email relay (MTA). Threat Emulation supports scanning web, email, and file-share traffic, and a single dedicated appliance on premise can manage both email and web traffic. Coupled with our market-leading management, Check Point Threat Emulation offers built-in SSL inspection and identity awareness. In addition to the sandbox function, Threat Emulation can be purchased with Anti-Bot for detection of infected hosts, as well as Antivirus and Check Point Threat Extraction for delivering clean files immediately. 3. A stand-alone sandboxing solution Check Point Threat Emulation can be deployed as a stand-alone solution in three different modes:  With only Threat Emulation blades activated, send files for cloud emulation  With only Threat Emulation blades activated, send files for local emulation on dedicated appliances  Hardware free implementation—We also offer configuration, set up, management, and sandboxing services fully hosted in the cloud. Customers only need to point their email and/or web traffic to our Capsule Cloud, and benefit immediately from the same protection available in the deployment scenarios described above. With this range of deployment options, we believe Check Point Threat Emulation, spans all three of Gartner’s categories for network sandboxing. This solution provides customers with the flexibility to either inspect files in the cloud or on premise using our Threat Emulation Appliances. SANDBOXING BACKGROUND According to Gartner, network-based sandboxing relies on ‘sensors’ that monitor network traffic and then submit suspicious objects to the ‘sandbox’ for payload analysis 4 . Suspicious files are flagged while minimizing false positives. Only in the last few years has sandboxing been deployable in the broader market utilizing current security skillsets and offering the capabilities described by Gartner, below. But this basic functionality still has limitations. Offered by many vendors, traditional OS-level sandboxing is often slow, subject to many successful evasion techniques, incapable of blocking some sophisticated attacks, and can only be evaluated once the malware is already active. By being the first to introduce CPU-level sandboxing, Check Point delivers a solution beyond the traditional OS-level sandboxing. Faster, evasion- resistant CPU-level threat emulation addresses the ‘pre-infection’ stage by analyzing the malware’s impact on the CPU and memory. With the combination of both OS-level and CPU-level sandboxing detection and blocking, we provide the highest level of zero-day protection, an unmatched level of security against even the most sophisticated attacks. In addition, our mobile solution extends this real-time protection to both iOS and Android users. SANDBOXING CAPABILITIES TO LOOK FOR The quality of sandboxing solutions varies widely. According to Gartner, some critical capabilities to look for in your next sandboxing solution include: 1. “The ability to analyze a broad range of suspicious objects 5 ” Check Point Threat Emulation identifies malware across a broad range of the most common document types used in organizations today, including:  Adobe Acrobat (PDF)  Adobe Flash (SWF)  Archive (TAR, ZIP, RAR and Seven-Z)  General (EXE, RTF, CSV and SCR)  Java (JAR)  Microsoft Office Package  Microsoft Excel (XLS, XLSX, XLT, XLM, XLTX, XLSM, XLTM, XLSB, XLA, XLAM, XLL and XLW)  Microsoft PowerPoint (PPT, PPTX, PPS, PPTM, POTX, POTM, PPAM, PPSX, PPSM, SLDX and SLDM)  Microsoft Word (DOC, DOCX, DOT, DOCM, DOTX, DOTM)  Word Processing (HWP)
  • 3. ©2016 Check Point Software Technologies Ltd. All rights reserved. January 12, 2016 How to Choose your Next Sandboxing Solution | White Paper 3 2. “Static analysis and other pre-filtering techniques 6 ” Check Point offers a multi-layered threat prevention strategy, using IPS, Antivirus, Anti-Bot, OS-level Threat Emulation, CPU- level Threat Emulation, Threat Extraction, and Threat Intelligence. Our IPS, Antivirus, and Anti-Bot solutions help filter out known threats, while Threat Emulation and Threat Extraction provide protection against new and unknown threats. Check Point leverages multiple pre-emulation engines to minimize the number of objects sent to the sandbox. We utilize advanced machine learning engines for executable files and various signature-based Antivirus engines. Static analysis evaluates and identifies malware without requiring sandbox analysis. In addition, we reduce sandboxing sessions by caching files sent through multiple channels of attack on the gateways, on the Threat Emulation appliance and on the cloud service. As new threats are confirmed as malware, updates are provided to static filtering engines in real-time. 3. “Comprehensive operating system and application stack 7 ” Check Point Threat Emulation provides multiple simultaneous simulation environments for sandboxing: Windows XP, 7, Microsoft Office, Adobe environments, and custom images. In addition to this, our upcoming capability of CPU-level Threat Emulation is OS agnostic and can detect threats based on instruction level behavior on any x86 Operating System. Preventing advanced threats on mobile platforms requires a holistic approach that is focused on the unique aspects of these platforms. Covering both iOS and Android, we offer the industry’s most advanced Mobile Threat Prevention solution. With the highest advanced threat catch-rate for enterprise-grade mobile security platforms, we secure the entire mobile device. 4. “Anti-evasion technologies 8 ” Traditional OS-level sandbox technology is based upon behavioral analysis within the operating system. Due to this, traditional sandboxing faces a major challenge when it comes to constantly improving evasion techniques. Our CPU-Level sandboxing detects vulnerability exploitations before the attacker has an opportunity to execute any code or evade detection. This extends Check Point Threat Emulation solution beyond even the customized hypervisors supported at the OS-level to provide the most advanced zero-day solution available. 5. “The rate at which objects can be analyzed in the sandbox 9 ” Check Point offers its Threat Emulation sandbox in two forms: a. Threat Emulation Cloud Service: This cloud service provides a scalable solution without requiring the customer to deploy additional infrastructure. Built to withstand high peak usage, it provides a highly available global service. b. Threat Emulation (TE) appliance: We provide a wide range of Threat Emulation appliances for on premise sandboxing. Rated by the monthly number of sandboxing sessions, they range from 250K to 2 million sandbox sessions per month. The appliances’ design withstands typical peak traffic. If the emulation capacity is exceeded it queues files and objects. With our gateways, customers can send files and objects across their network to the TE appliance for sandboxing. By creating an array of TE appliances load-balanced by our gateways, this solution easily scales to any volume without the need for a third-party load-balancer. 6. “A combination of virtualization-based and emulation-based sandboxing analysis 10 ” We focus our sandbox approach on the providing the best methods of threat detection while preserving both performance and efficiency. With virtualization-based approaches, we provide exceptional performance compared to solely emulation-based approaches. With the combination of our CPU-Level technology and the actions we perform within virtualization, we provide the best of both of the approaches. 7. “Contextual information about the malware or targeted attack 11 ” Our Threat Emulation solution works hand in hand with ThreatCloud ™ , our threat intelligence database. ThreatCloud™ leverages threat feeds from all of our customers and many threat intelligence partners. Every time Threat Emulation marks a file as malicious, it adds this information to the ThreatCloud ™ database. In addition, through Check Point’s management and
  • 4. ©2016 Check Point Software Technologies Ltd. All rights reserved. January 12, 2016 How to Choose your Next Sandboxing Solution | White Paper 4 SmartEvent, customers gain complete visibility into their network. Customized reports of events pointing at the sources, destinations, services, and type of attacks help determine whether attacks are targeted or not. 8. “Integration with forensics tools 12 ” Our Endpoint Forensics solution provides detailed insight for detections found on the network and the endpoint. Coupled with complete forensic information, it provides a complete analysis highlighting how the attack entered the organization, damage occurred, command and control communications, lateral movement, and more. This information allows it to automatically identify all hosts with the same infection. Additionally, we offer a tie-in between Threat Emulation and Bit 9's Carbon Black, enabling 2-way transfer of zero-day malware information at the endpoint. SUMMARY Gartner recommends that “if your organization is budget-constrained or looking for a quick path to add sandboxing, first evaluate adding sandboxing as a feature from one of your current security vendors. 13 ” And “If budget permits, or when targeted malware is identified as a high risk, evaluate stand-alone sandboxing solutions. 14 ” At Check Point, we offer both. For customers looking for the best stand-alone solution we provide three alternate implementations based on a dedicated and comprehensive solution. These solutions range from a zero-hardware approach to an on-premise Threat Emulation appliance. Bundled with a full stack of threat prevention technologies, they also include our unique CPU-Level sandboxing and innovative Threat Extraction capabilities. The solutions integrate with Check Point’s leading intelligence—ThreatCloud ™ , and the only open marketplace for cyber-intelligence—IntelliStore ™ . Our solution covers the Incident Response process, including SmartEvent—our visualization and investigation platform, Endpoint Forensics, and the ability to detect and block infected hosts with Anti-Bot. For the budget-conscious customers, we provide a state-of-the-art advanced threat protection solution that seamlessly integrates with existing security, secure web gateways, and management to send files and objects either to the Threat Emulation cloud service or to an on-premise Threat Emulation appliance. Check Point Threat Emulation meets all the criteria provided by Gartner for an effective sandboxing solution. We provide the only sandboxing solution that combines the power of CPU-level and OS-level protection to detect and block malware, and to prevent infections from undiscovered exploits, zero-day, and targeted attacks. Check Point’s Threat Emulation is only one part of our comprehensive end-to-end portfolio spanning next-generation threat protection, mobile security, next-generation firewalls, security management, and much more. Evaluate Threat Emulation today—http://www.checkpoint.com/try-our-products/ Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 4 “Market Guide for Network Sandboxing,” page 1, Gartner, 2 March 2015 5 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015 6 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015 7 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015 8 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015 9 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015 10 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015 11 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015 12 “Market Guide for Network Sandboxing,” page 4, Gartner, 2 March 2015 13 “Market Guide for Network Sandboxing,” page 5, Gartner, 2 March 2015 14 “Market Guide for Network Sandboxing,” page 5, Gartner, 2 March 2015