Sand Box – Isolating the risk
Aggressive competitors who are eager to gain information on your organization, or some hacker in the service of an internet crime gang, will do whatever it takes to penetrate the core of your computer network, to grab data, replicate it, disrupt it or delete it. Zero Day or Targeted attacks, which are designed to compromise sensitive, critical data, are an everyday occurrence. They practically take place all the time.
Malware which for the most part go undetected by standard data security tools, are planted into companies’ computers and databases, where they linger in secret, sometimes for months at a time, steal data and send it outside the organization using command and control tools.
Kaspersky lab projection for 2015:
“… We have detected the disintegration of large ’loud’ groups of hackers who specialized in Advanced Persistent Threat (APT) attacks due to them being exposed by law enforcement agencies. Having broken up, these groups became tiny teams of lone hackers… which would make it very difficult to identify signatures of malware and new viruses …”
The Sand Box solution in fact simulates the IT network’s real environment – albeit in an isolated and secure environment, where organizational traffic is run in order to monitor files, software and emails which contain attachments with viruses or other Zero Day threats.
- Blocking contaminated email attachments
- Protection against risks posed by the following files: MS Office, Adobe PDF files, EXEs, and ZIPs
- Monitoring, identifying and blocking malware imbedded in MS Office files
- Monitoring, identifying and exposing threats lurking in SSL or TSL protocols of secure email applications, including VOIP fax, IM and so on
- Ongoing work support: Sand Box does not undermine rapid flow of business procedures
Best of Breed: Choosing the best product:
After carefully exploring software vendors and existing on the shelf technologies, we at Spider Solutions have chosen as our business partners for Sand Box products manufactured by: Trend Micro, Check Point, Symantec.
Spider Solutions’ service concept:
We place the highest emphasis on prompt, professional, courteous and efficient service, so we dedicate a great deal of time and resources in training our employees and certifying them by the leading software and hardware companies, our business partners.
Spider Solutions’ call center, which is on call 24/7, is fully staffed with data security engineers at our clients’ disposal.