Check Point CPU Level Threat Prevention

Zero day and unknown Malware are extremely sophisticated threats, undetectable by traditional anti-virus engines.

Zero day and unknown Malware are extremely sophisticated threats, undetectable by traditional anti-virus engines.

Zero day and unknown Malware are extremely sophisticated threats, undetectable by traditional anti-virus engines. Sandboxing techniques are being used to detect these advanced threats, looking for malicious activities at the OS (operating system) once the Malware is active.

Traditional Sandboxing technology is very effective….but not enough anymore!

Advanced hackers design new evasion techniques to stay undetected. This gap can be addressed by detecting one step before the computer gets infected at the exploitation stage. Hackers exploit software vulnerabilities at the CPU level. There are several exploitation methods, but the most popular one is ROP (Return-oriented programming).

What is ROP?

ROP is a computer security exploit technique that allows an attacker to execute code in the presence of security defenses such as non-executable memory and code signing. In this technique, an attacker gains control of the call stack to hijack program control flow and then executes carefully chosen machine instruction sequences, called “gadgets”. Each gadget typically ends in a return instruction and is located in a subroutine within the existing program and/or shared library code. Chained together, these gadgets allow an attacker to perform arbitrary operations on a machine employing defenses that prevent simpler attacks.

When opening a malicious document ROP hijacks small pieces of legitimate code from the memory and manipulates the CPU to load and execute the actual Malware. Detecting this manipulation at the CPU level is the key to stopping attacks before they even happen.

Check Point Next Generation Zero Day Protection is the only Sandboxing solution that both integrates OS & CPU Level Threat Prevention engines, eliminating threats at the point pre-infection and increasing Malware catch rate. It is operating system agnostic technology and is resilient to sandboxing evasion techniques.

And most importantly the First True Zero Day Detection Engine as it stops whatever Malware would be downloaded and executed.

See the latest Check Point video on CPU Level Prevention:

If you would like to learn more about Check Point Software Technologies’ solutions and products, please contact a member of the Atomos Networks’ technical sales team on 0113 323 7722 or email sales@atomosnetworks.com

Structured Cabling

Our structured cabling services are designed to help untangle the process around relocating your business, or extending your existing computer cabling. We can assist you with designing and installing your structured Cat5e, Cat6 and Cat7 ethernet cabling, fibre optic cabling, or wireless network solutions for your voice and data network.

Wide Area Connectivity

We’ve got extensive experience in designing and delivering wide area networks (WANS) throughout the UK & EMEA. We take the complexity out of implementing a WAN and have partnered with several key UK internet service providers (ISPs) - all of which have secure data centres located within the UK and around the globe.

Protection and Management

The scoping document includes a breakdown of circuits such as DSL, EFM and leased line. A full breakdown of costs is included as well as an SLA covering each area. Importantly, we also highlight any potential limitations caused by bandwidth and/or QoS.

Network Audits

We can perform a network checkup on your current network infrastructure. This includes throughput analysis, an assessment of any potential hardware limitations and floor port fluke tests future growth. We then consider the best options for future-proofing the new network as best as possible.