Ds Anti Bot

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Check Point Anti-Bot Software Blade | Datasheet

CHECK POINT
ANTI-BOT SOFTWARE BLADE

FEATURES WHAT IS A BOT?


Integrated Anti-Bot Network Solution
A bot is a malicious, stealthy software that invades your network and allows criminals
 Post-infection protection by
discovering bots and stopping their to remotely control your computer. Cybercriminals can remotely execute illegal
damage activities such as stealing data, spreading spam, distributing malware and
 Management, reporting and policy participating in Denial of Service (DOS) attacks without your knowledge. Bots play a key
unified with Antivirus Software Blade
role in targeted attacks also known as Advanced Persistent Threats (APTs). A multi-
 Available on every gateway
 Optional SandBlast Agent provides layered integrated threat prevention solution is needed to protect your company from
Anti-Bot protections on the endpoint such attacks.

Powered by ThreatCloud
ThreatCloud is the first collaborative CHECK POINT ANTI-BOT SOFTWARE BLADE OVERVIEW
network to fight cybercrime that feeds The Check Point Anti-Bot Software Blade detects bot-infected machines and prevents
security gateway software blades with bot damages by blocking communications from the cybercriminals’ Command and
real-time security intelligence
Control (C&C) servers. Using a continually updated list of C&C addresses from
 20 million unique websites used for
bot communications with a command ThreatCloud™, the largest real-time security threat knowledgebase from the cloud, the
and control server Anti-Bot Software Blade detects stealthy bots before they can do damage and aff ect
 12 million malicious file signatures users.
 3.5 million malicious websites


Multi-tiered ThreatSpect
Bot Detection Engine
THE SOLUTION TO BOTS
Discover infections by correlating Check Point Threat Prevention Solutions, including the Anti-Bot Software Blade, are
multiple bot detection methods powered by ThreatCloud ™ which feeds the security gateway with up-to-the-second
 Reputation of IPs, URLs, DNS security intelligence with over 75 million addresses analyzed daily for bot discovery,
addresses
over 12 million malware signatures and over 3.5 million malware infested websites.
 Patterns detection of bot
communication
 Scan for bot actions
 Unified protection and management
integrated with the Anti-Bot Software
Blade
 Centrally managed from a single, user ThreatCloud is the first collaborative network to fight cybercrime. It delivers real -time
friendly console dynamic security intelligence to security gateways. That intelligence is used to identify
emerging outbreaks and threat trends. ThreatCloud powers the Anti-Bot Software
BENEFITS Blade allowing gateways to investigate always-changing IP, URL and DNS addresses
 Discover bots that have infiltrated your where Command and Control Centers are known. Since processing is done in the cloud,
computers
millions of signatures and malware protection can be scanned in real time.
 Stop APT Attacks
 Prevent damage such as stolen data
 Keep up with the ever-changing ThreatCloud’s knowledgebase is dynamically updated using attack information from
dynamic threat landscape with real- worldwide gateways, feeds from a network of global threat sensors, Check Point
time intelligence from ThreatCloud
research labs and the industry’s best malware feeds. Correlated security threat
 Easily investigate infections, assess
damage and decide on next steps with information is then shared among all gateways collectively.
extensive forensics tools
 View and manage the “big malware
picture” with integrated threat reports
and dashboards

©2016 Check Point Software Technologies Ltd. All rights reserved.


August 22, 2016
Check Point Anti-Bot Software Blade | Datasheet

THREATSPECT BOT DISCOVERY ENGINE


Bots are stealthy, often hiding in your computer undetectable by


common antivirus programs. The Check Point Anti-Bot Software
Blade detects bot-infected machines with its ThreatSpect™
engine, a unique multi-layer discovery technology with up-to-
the-minute updates feeds from ThreatCloud. ThreatSpect
correlates information for accurate bot detection.
 Remote operator addresses including IP, DNS and URLs
 Detect unique botnet communication patterns
 Detect attack behavior such as spam or clickfraud

BLOCK BOT COMMUNICATION Figure 2. View the "big malware picture" with integrated threat reports.
Once a bot is detected, the Check Point Anti-Bot Software
Blade blocks remote command communication between the
infected machine and the C&C server, rendering the bot
INTEGRATED INTO CHECK POINT SOFTWARE
useless to the Cybercriminal and protecting the organization BLADE ARCHITECTURE
from potential bot damage. The Anti-Bot Software Blade Software Blade is fully integrated
into the Software Blade architecture, saving time and reducing

INVESTIGATE BOT INFECTIONS costs by allowing customers to quickly expand security


protections to meet changing requirements. It can be easily and
Seamlessly investigate bot infections with advanced logs and
rapidly activated on existing Check Point Security Gateways
management system providing key inputs such as infected
saving time and reducing costs by leveraging existing security
machine/user, bot name, bot actions (such as communication
infrastructure. The Anti-Bot Software Blade is centrally managed
with command & control and spam sending), amount of data
enabling central policy administration, enforcement and logging
sent/received, infection severity and more.
from a single, user-friendly console.

In addition, the solution includes a comprehensive ThreatWiKi


enabling security teams to easily understand the bot they are EXTENDED PROTECTION TO ENDPOINTS
facing—what does it do, how it operates and any other Anti-Bot capabilities are also available in the optional
available technical information. SandBlast Agent, extending post-infection protectionto end-
user systems, to keep users safe no matter where they go.
Malware contracted while roaming outside the network
perimeter will be detected, and Command & Control activity
blocked, With the addition of SandBlast Agent, additional
information is available for Anti-Bot detections, including the
specific system and process demonstrating suspicious
behavior, even when behind a NAT router.

ANTI-BOT SOFTWARE BLADE SPECIFICATIONS


Figure 1. Extensive forensics for deeper understanding of security events.
Supported Appliance Families

 Available on all Check Point Appliances (Small and Medium,


Enterprise, Large and Data Center Appliances)
 Check Point Power-1
 Check Point IP Appliances
 Check Point UTM-1
 Check Point IAS
Supported Operating Systems

 GAiA
 SecurePlatform
 IPSO 6.2 Disk-based
 Windows
©2016 Check Point Software Technologies Ltd. All rights reserved.
August 22, 2016

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy