ANSecurity deploys large scale installation of new Check Point SandBlast technology to combat ‘Zero Day’ and stealth attacks at major UK manufacturer
SandBlast delivers evasion-resistant sandboxing and threat extraction using CPU-level threat detection to uncover threats at the pre-infection level, significantly reducing the risk of expensive breaches
UK – 10th December 2015 – ANSecurity, a specialist in advanced network and data security, has helped a major UK customer within the manufacturing sector to strengthen its security posture through new Check Point SandBlast technology which examines activity at a CPU level to detect signs of potential malware including hard to spot ‘Zero Day’ threats.
As a highly-respected security specialist and one of Check Point’s fastest growing partners, ANSecurity’s work with the manufacturer on the deployment of SandBlast will help to protect several thousand desktop and mobile users within the organisation. The deployment will cover over 50 global locations as part of a multi-million pound overhaul of security.
“SandBlast’s cutting-edge CPU-level exploit detection engine is uniquely capable of identifying the most dangerous, zero-day threats in their infancy, before malware has an opportunity to deploy and even attempt to evade detection. The innovative approach significantly raises the bar in terms of IT security and the integration with Check Point’s blade architecture offers a lot of potential for organisations that are targets for crafted attacks that are often missed by traditional signature based approaches,” says Giles Barford, senior security consultant for ANSecurity.
SandBlast is an evolution of earlier Threat Emulation technology that ANSecurity has successfully deployed since 2013 for several customers including UK blue light services. “We have been examining the updated technology in our own labs since July but this proof of concept project which will go live in January of 2016 has allowed us to gain more real world insight into SandBlast. The addition of the new Threat Extraction technology is a significant step forward in countering the threat posed by hackers. The solution pre-emptively removes threats by reconstructing documents with known safe elements, extracting active content, embedded objects and other exploitable content eliminating potential threats. This allows a business to continue to receive docs while eliminating risks and speeding up inspection when opening common Word and PDF documents,” Barford adds.
Although an innovative addition to the toolbox, Barford maintains that no one technology is ever a magic bullet when it comes to mitigating risk, detecting threats and counteracting attacks, “The recent proof of concept uses eight multi-layered Check Point Software blade modules including Anti-bot, App Control and Identity Awareness. The threat landscape is continually evolving and diversifying so any solution that helps organisations stay ahead of the latest threats without impacting operational efficiency is critical in maintaining robust network security. However to remain effective, technology must be underpinned with good processes and education of users to ensure the highest standards of security are achieved.”
Michael Wakefield, Head of Channel, UK for Check Point added, “Working with our partners like ANSecurity and end customers on these exciting projects further highlights the challenges organisations face in staying secure and the need for proactive prevention technologies that block malwares and protect against sophisticated and persistent attacks.” “By working with a portfolio of technologies that are all architected to work together on the same blade platform, both our expert partners like ANSecurity and end-customers are able to run proof of concepts and then full deployment much quicker with the assurance that each element will work together – this speed to market is another vital aspect as organisations endeavour to strengthen IT security strategies,” Wakefield adds.
ANSecurity is a specialist in securing networks and protecting data that helps some of the largest organisations in the UK and global brands to reduce risk and simplify operational management. In fact, the 10 largest ANSecurity clients have aggregate annual turnover in excess of £780 billion, employ over 779,000 staff and include top three players in the fields of financial services, retail and logistics. Public sector customers include local and central government, schools and colleges, police forces and the NHS.
ANSecurity is made up of subject matter experts that are focused on solutions and not just specific brands. This independence is maintained by ongoing certification and accreditation with over 32 leaders in secure information technologies including market stalwarts and innovative start-ups.
But our ethos recognises that technology by itself is not enough to create world class security processes that reduce risk. As such we offer consulting services to help our customers architect mature security methodologies and educational services to help them develop the skills needed to strengthen security from within.
As we celebrate our 12th year of double digit growth, ANSecurity will continue to build both point and end-to-end solutions that protect our customers’ networks and businesses while continually expanding our knowledge to meet the evolving IT security challenge. To learn more, visit www.ANSecurity.com
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
Anne Harding The Message Machine (PR for ANSecurity) Tel: 07887 682943 Email: firstname.lastname@example.org