Check Point CPU Level Threat Prevention

Zero day and unknown Malware are extremely sophisticated threats, undetectable by traditional anti-virus engines.

Zero day and unknown Malware are extremely sophisticated threats, undetectable by traditional anti-virus engines.

Zero day and unknown Malware are extremely sophisticated threats, undetectable by traditional anti-virus engines. Sandboxing techniques are being used to detect these advanced threats, looking for malicious activities at the OS (operating system) once the Malware is active.

Traditional Sandboxing technology is very effective….but not enough anymore!

Advanced hackers design new evasion techniques to stay undetected. This gap can be addressed by detecting one step before the computer gets infected at the exploitation stage. Hackers exploit software vulnerabilities at the CPU level. There are several exploitation methods, but the most popular one is ROP (Return-oriented programming).

What is ROP?

ROP is a computer security exploit technique that allows an attacker to execute code in the presence of security defenses such as non-executable memory and code signing. In this technique, an attacker gains control of the call stack to hijack program control flow and then executes carefully chosen machine instruction sequences, called “gadgets”. Each gadget typically ends in a return instruction and is located in a subroutine within the existing program and/or shared library code. Chained together, these gadgets allow an attacker to perform arbitrary operations on a machine employing defenses that prevent simpler attacks.

When opening a malicious document ROP hijacks small pieces of legitimate code from the memory and manipulates the CPU to load and execute the actual Malware. Detecting this manipulation at the CPU level is the key to stopping attacks before they even happen.

Check Point Next Generation Zero Day Protection is the only Sandboxing solution that both integrates OS & CPU Level Threat Prevention engines, eliminating threats at the point pre-infection and increasing Malware catch rate. It is operating system agnostic technology and is resilient to sandboxing evasion techniques.

And most importantly the First True Zero Day Detection Engine as it stops whatever Malware would be downloaded and executed.

See the latest Check Point video on CPU Level Prevention:

If you would like to learn more about Check Point Software Technologies’ solutions and products, please contact a member of the Atomos Networks’ technical sales team on 0113 323 7722 or email sales@atomosnetworks.com

Managed Voice

Need telephony that fits with your business? We have years of experience in delivering both Cisco and Mitel telephony - from small offices to corporate call manager solutions. If you don’t need on-premise telephone, we also provide virtual hosted telephony.

Virtual Office Numbers

We provide UK & EMEA virtual office numbers that allow you to have a virtual presence in a region of your choice. Depending on location, we can provide toll-free numbers. We can route all numbers to any UK landline, UK mobile – or indeed any number worldwide.

Borderless Networks

Workspace, as we know it, has changed dramatically in recent years. We can assist in the design and delivery of your borderless network, working with our partner Cisco. Our aim is to enable various services such as mobility, security and applications with our key vendor technologies, whilst simplifying operations, increasing productivity, and aiding the operational efficiency of your organisation.

Site Visit and Audit

From the early planning stages of your office move, we can design the very best network and IT system available for your new space. We begin by auditing your current infrastructure - ascertaining any aspirations for improvement. We then visit your new site before you’ve even moved in. That way, your new network and IT system will be designed collaboratively - optimised for the needs of your growing business.