Open House • Learn how you can grow your career with us! • May 15 • 3:00–6:00 p.m. • Merrimack, NH
NOTE: Images may not be exact; please check specifications.
  • In Stock
  • Virtual delivery
Ordering Information
The Threat Emulation engine picks up malware at the exploit phase, even before hackers can apply evasion techniques attempting to bypass the sandbox. Files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before it enters your network. This solution combines CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous exploits, and zero-day and targeted attacks. In addition, the SandBlast Threat Extraction capability immediately provides a safe version of potentially malicious content to users. Exploitable content, including active content and various forms of embedded objects, are extracted out of the reconstructed file to eliminate potential threats.
15