Behavioral Protection

The Anti-Bot component

  • Uses the ThreatCloud repository to receive updates and queries the repository for classification of unidentified IP, URL, and DNS resources
  • Prevents damage by blocking bot communication to C&C sites and makes sure that no sensitive information is stolen or sent out of the organization.

There are 3 configuration options for the Anti-BotClosed Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT. protection: Prevent, Detect, and Off.

The Anti-Ransomware Component

Constantly monitors files and network activity for suspicious behavior. It creates honeypot files on client computers.

It stops the attack immediately after it detects that the ransomware modified the files.

Before ransomware attack can encrypt files, anti-ransomware backs up your files to a safe location.

The Anti-Exploit Component

Harmony Endpoint Anti-Exploit detects zero-day and unknown attacks.

Files on your computer are sent to a testing area for emulation to detect malicious files and content.