SandBlast Now Product Brief PDF
SandBlast Now Product Brief PDF
SandBlast Now Product Brief PDF
1
Fail-open NICs available on select appliance models. See Check Point Product Catalog for details.
All rights reserved | May 2020
SandBlast Now | Product Brief
if powered down or
faulty. Bypass mode
can also be explicitly
controlled from the
Cyber Defense Center
(CDC) portal.
Traffic mirroring is
2
also supported on
public cloud platforms.
Cloud-native APIs are
used to achieve fully
automated sentry
deployment, with no
modifications required
to customers’ VPCs.
SandBlast Now is fully
plug and play. Sentries are preconfigured so that they become fully operational within minutes of deployment, whether on
physical or virtual networks. Both DHCP and static network configuration are supported. The sentry automatically
registers on the Sandblast Now Cloud, establishes an SSL VPN (TCP port 443) tunnel for all control plane traffic, and
initiates network traffic inspection, with no further administration or configuration required.
Painless deployment allows Managed Security Service Providers (MSSPs) to use SandBlast Now sentries as Customer
Premises Equipment (CPE) for delivery of value-add services, such as threat hunting, Managed Security Service (MSS),
3
and Incident Response (IR) . The CPE solution eliminates any dependency on customers’ existing security estate,
thereby greatly reducing service Total Cost of Ownership (TCO) on training, maintenance, and integration. Enterprises
can also enjoy the benefits of an independent cyber overlay approach that does not require them to change or upgrade
their existing security management platforms in order to enjoy the latest Check Point Infinity cyber security engines.
Appliances can be shipped to remote branches and installed by unskilled personnel. Sentries can be easily deployed
wherever observability is required. They can also be easily moved between network locations as
needed, for network audit, network forensics, or IR purposes.
Based on the latest Check Point Security Gateway software releases,
SandBlast Now sentries can support a vast array of security features
that support its mission, including Identity Awareness, ICAP and MTA
modes, HTTPS Inspection, and many others. A wide range of physical
and virtual appliances and accessories is
available to meet any organization’s needs,
from SOHO and branch offices, to data center
and cloud.
2
SandBlast Now sentries for public cloud are branded “Check Point CloudGuard IaaS TAP”.
3
MSS and IR services can optionally be further supported by corresponding Check Point service offerings.
© 2020 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content 2
SandBlast Now | Product Brief
© 2020 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content 3
SandBlast Now | Product Brief
HUNT
The Cyber Defense Center (CDC) is a Web-based portal whose
purpose is to provide cyber defenders and SOC analysts with cyber
situation awareness and the ability to intervene and disrupt
undesired communication. This scalable, multi-tenant, multi-tier
platform also allows customers to enjoy cyber defense as a service
from Check Point and its service partners, as well as participate in
collaborative defense with other industry sector colleagues.
Each customer ‘domain’ incorporates, consolidates, and correlates
event logs from one or more physical and virtual sentries, combining
on-premises and cloud visibility into a single picture. Tiering support
also enables delegation of duties, so that complex environments can be divided into subdomains, while retaining a birds-
eye view and reporting capability for the entire estate, on a single pane of glass.
Application and threat visualization appears on
the CDC portal within minutes of automated
deployment. In contrast with competing
solutions that rely only on baselining and
behavioral analysis for anomaly detection,
SandBlast Now harnesses the power of
ThreatCloud threat intelligence and the
industry’s largest application fingerprinting
library, together with its integrated set of
behavioral analytics in order to deliver
immediate insights into the traffic patterns, as
well as reducing the false-positive noise level
that is characteristic of pure-behavioral analysis.
Triage of anomalous network traffic involves a
combination of automated analysis and human
analysts, working together to ensure timely, accurate and relevant information is delivered for effective response to cyber-
attacks. While automated controls excel at sifting through huge amounts of big data and detecting anomalous behavior,
human intelligence is still superior when it comes to identifying patterns of unauthorized behavior, weeding out false
positives, categorizing events by motive and intent and identifying effective and safe Courses of Action (COAs). This
methodology allows identification of initial attack vectors, as well
as subsequently subverted hosts and compromised data.
The SandBlast Now threat hunting concept of operations starts
with threat indications from the sentry threat prevention engines,
driven by real-time ThreatCloud threat intelligence. These are
each categorized by confidence and severity. Typically high-
confidence detections would also be blocked by the customer’s
primary lines of defense (assuming these are up to par). A high-
confidence true positive match therefore implies that an attack
might have bypassed or penetrated defenses. For example, in
the Trickbot example depicted above, the detected beacons
serve to incriminate compromised entities on the network. The analyst then pivots on this data set, performing a data flow
analysis using CDC tools in order to identify covert
communication paths and lateral movement mechanisms. Logs
and packet captures can be further analyzed to pinpoint attacker
Tactics, Techniques and Procedures (TTPs).
Lower-confidence threat indications are also highly valuable as
they can sometimes serve to identify an anomaly that is the “tip of
the iceberg” for an otherwise stealthy attack. Analysts triage
these detections, correlating them with evidence of anomalous
application traffic as well as behavioral transitions pre- and post-
detected event. False positives are filtered out to reduce noise.
© 2020 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content 4
SandBlast Now | Product Brief
© 2020 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content 5