Xeno1234
Level 14
- Jun 12, 2023
- 684
oh cool. Is it similar to like Kaspersky SandboxFiles from 73 formats and up to 50 MB are sent to the cloud where they are opened and behaviour is examined. To do that, Check Point uses resistant sandboxes connected to the internet (they do all sorts of things like mimicking user activity as well) and then it uses various engines such as Yara rules on process memory, CADET, Bitdefender, Office Macro engines, CPU-level detection, Intel TDT, IPS and others to produce a verdict.