It's not a publicly available product, as noted above. As such, there is no information I can provide publicly. You are welcome to participate in the Early Availability program, contacting the parties above.
The screen you are showing is part of a forensics report. This report is triggered when we identify an attack and it is automatically analyzing the full scope of the attack. One of the sections in the report is to identify what is the attack damage. This is listed under the “Business Impact” section. Both in the overview tab and as a separate tab.…
I've had a few requests to create a product/space mapping. Feedback welcome. Product or Function Space to Post 600 Security Appliances 700 Security Appliances 1100 Security Appliances 1200R Rugged Appliances for Industrial Control Systems 1400 Security Appliances UTM-1 EDGE Appliances Safe@ Appliances Security Management Portal SMB andPreviewHide preview
When deploying or conducting POC for SandBlast Agent you most probably use dedicated machine for Endpoint management while your primary Check Point log server may be already configured with all your customized settings and even integration with SIEM. In that case you would want to sent all your logs securely from Endpoint log server to your…(Show moreShow less)
Chrome itself requires to be in a domain to allow central management of an extension. This is not the case for IE. So there is no such requirement for IE. This is not related in any way to the AD scanner feature on the management.
As Dameon wrote, Threat Extraction & Threat Emulation in the SBA browser extension will prevent the malicious files from getting to the disk. SBA browser extension is an integral part of the Sandblast Agent installation you have.
27-July-2017 BlackHat, Las Vegas, USA Even on day-2 Check Point booth # 1260 continued to witness large number of visitors. Yes, day-1 was very busy for booth staff for entire 10-hour duration. But day-2 was even busier as for every presentation booth remained packed with standing audience as seen below: Our social media promotion…(Show moreShow less)
Tell me, please, how can I see in Endpoint Management Server which policy number of the SBA blade is installed on the user's machine? I need something that looks like a Policy Reports which are configured in $UEPMDIR/engine/conf/local.properties, but the are for OneCheck User Settings, Full Disk Encryption, Media Encryption & Port Protection, and…(Show moreShow less)
Hi Oren, Thanks for you reply. On the policy tab, I can see the current policy number that the administrator has set. But how can I be sure that the agent has updated the necessary policies? How can I see the number of the policy that is actually installed on a certain computer?
26-July-2017 BlackHat, Las Vegas, USA Check Point booth # 1260 was visited by 1274 individuals. Booth was ready by evening of 25-July, Tuesday, and announced on social media post, which received over 2000 views and 40 likes within 24 hours. Booth promptly opened at 10 AM on 26-July, Wednesday, and every presentation was full house with…(Show moreShow less)