Sandblast Battle Card
Sandblast Battle Card
Sandblast Battle Card
Check Point OS and CPU-level Threat Emulation evaluates Success Stories Third Party Analysis Videos
documents by launching them in a virtual sandbox, GIMV Customer Testimonial Zero-Day Protection
Boston Properties Testimonial 2016 Forrester Wave CPU-Level Threat
to identify new, obfuscated, or evasion-based attacks Report Protection
2016 NSS BDS Test
Check Point Threat Extraction delivers a clean version of
Report
documents immediately, with access to the original only Product Information 2015 Gartner Market
White Papers
Customer Presentation Sandboxing: Expose
after it has been deemed safe (internal, partners)
Guide
the Unknown
2014 Miercom
Product Page (public, PartnerMAP) Zero Second
Up and running quickly, with flexible deployment options Test Report
Test Plan (internal, partners) Unknown 300
as standalone appliances, software blades RFP Template (internal, partners) TCO - Nick Lippis
in existing gateways, or a cloud service
2015 Check Point Software Technologies Ltd. 1
[Q3 2016 [Confidential] for designated groups and individuals
Q3 2016
Proofpoint
Websense
Key
Sourcefire
TrendMicro
HOW TO COMPETE AGAINST...
Palo Alto
Bluecoat
Lastline
Fortinet
FireEye
McAfee
Capability
Check
Cisco
Point
Infrastructure Overhead: Requires 2 or 3 additional by Vendor
appliances at the organization - for email, for web and for Advanced Threat Prevention Matrix
central management
Real-Time 1 1
Partial visibility to incoming files: No SSL / TLS inspection, Prevention-
Unknown
allowing files in encrypted communications to get into Malware
organization 6
Files Supported
Poor results in NSS labs BDS test
The solution doesnt prevent malware but notifies the
OS Support
administrator about the malicious files retroactively (up to 15
mins)
Protocols
No solution for archive files other than zip
PDF File size limited to 1MB & Doc (office) file size limited System Activity
WildFire to10MB Detection
SWG)
Inspect
Unable to perform preemptive actions (threat extraction) to Encrypted 3 3 4 3 3
No prevention capabilities can only detect threats after the Endpoint: Zero-
5
fact with SPAN port deployment Day Detection &
Forensics
Zero visibility to incoming files: No SSL inspection, allowing Summary
files
Deep in encrypted communications to get into the organization A Complete
Threat
Discovery Can be easily evaded as it is based on commercial Prevention
Solution
hypervisor Virtual Machine
1) Only on email 4) Commercial hypervisor
2) only SPAN port 5) No sandboxing on endpoint
3) needs a separate appliance 6) No archives support (except ZIP)
Need more info? Contact Threat_Prevention_Sales@checkpoint.com Need more info about the matrix ratings? Check out the Heat Map
(internal only)
[Q3 2016 [Confidential] for designated groups and individuals
Q3 2016
SUMMARY ENSURING THE WIN TOP POSITIONING TIPS FROM THE FIELD
For enterprises at risk of targeted attacks such as spear phishing and APTs, 1. Highlight the proven (NSS) best catch rate and evasion resistant
detection capabilities, especially with the CPU-level engine
Check Point Zero-Day Threat Emulation, with its unique CPU-level detection,
provides an additional layer of security from even the most sophisticated 2. Stress out the importance of practical prevention Check Point offers
vs. detection only with the other players
hackers. Unlike traditional sandboxing solutions that are subject to evasion
3. For existing customers elaborate on their ability to capitalize on their
techniques, Check Point catches more malware, with minimal impact on investment with Check Point and add Threat Emulation capabilities
delivery times. with minimal effort, into integrated alert and management consoles
4. Push for POC for customers who are aware of the APT problem, if not,
Promote the Security Checkup (internal, partners) to demonstrate our value proposition. offer a security checkup
2015 Check Point Software Technologies Ltd. 3
[Q3 2016 [Confidential] for designated groups and individuals