Zero Second Protection from Check Point

Zero Second Protection from Check Point

Zero Second Protection from Check Point

How often is your network at risk?

Every year threats are becoming more sophisticated and more frequent. Relying on signatures to identify malicious traffic entering your network can no longer be your only point of focus.

Recent tests by a team at Check Point has proved that by simply appending data to the end of malware can change the properties of the program, so that it has a new unique signature and no longer identified as the original. This is one of the reasons why there are so many variants of malware signatures. Not only are there many variants, but the entry points into a network have also increased. Most vendors deal with unknown malware by means of a sandbox environment. Virtual machines are spun up with an unknown file or program that can be executed to monitor its file access. Any files that attempt to access restricted areas of the system are deemed malicious and blocked. PDF files for example should not attempt to access any areas of the registry. Check Point’s test focused on 4 of the leading vendor solutions to monitor how well they faired against unknown malware; malware that was known, but simply had its signature changed by modifying the payload. The results were quite unexpected. See the following document: Check Point Zero Second White Paper.

Firewalls

We treat the business of network security very seriously indeed. We're experts in this field and along with security vendors like Check Point, we view security as a business process which requires significant consideration and investment (if the scope so requires). We can provide you with world-class firewall products, all of which are next generation. Since we’re not a ‘one size fits all’ IT consultancy, we ensure that the firewall product we recommend meets the exact network security needs of your business.

Site Survey

Considering the best way to configure your network starts with a site survey, where we discuss all of your network needs (now and in the near future), so that we can create an accurate functional scope of what’s available to you.

Web Applications

Our partner, Incapsula, provide a PCI-certified Web Application Firewall (WAF) product that ensures your website or application is protected from attacks. This solution is cost-effective and can be set up in no time at all. If you’d like more information or a free trial, simply get in touch using our contact form

Video Conferencing

We provide enterprise class Video Conferencing solutions through Cisco's extensive portfolio. We are experts in delivering Cisco Telepresence, Cisco WebEx Meetings and Cisco WebEx Teams and can provide design, installation and configuration for all three of these solutions.