https://newsletter.en.creamermedia.com
SECURITY|Service|System|Technology
SECURITY|Service|System|Technology
security|service|system|technology

IT threat extraction system removes scripts and macros from key documents

NOAM GREEN
Any document might contain malware and the only way to ensure malware-free documents is to reconstruct the file using known and safe elements

NOAM GREEN Any document might contain malware and the only way to ensure malware-free documents is to reconstruct the file using known and safe elements

3rd April 2015

By: Schalk Burger

Creamer Media Senior Deputy Editor

  

Font size: - +

Information and communications technology security vendor Check Point’s Threat Extraction system removes macros, Java scripts and code-enabled capabilities from documents in a company’s network, preventing malicious scripts from executing processes, says Check Point product manager Noam Green.

The Check Point Threat Extraction system can be deployed through an electronic update, for existing customers, or as an appliance, and Check Point will also provide a cloud threat extraction service for customers during the second quarter of this year.

Although code-enabled capabilities boost the functionality of documents, these capabilities could enable malicious software, or malware, to be programmed into macros and then sent as part of a document to infect a computer.

Check Point removes the code-enabled capabilities of commonly used documents, including Microsoft Office and PDF documents.

“We will broaden the system’s capabilities to remove the scripts in open source documents and other commonly used document formats during the second half of the year,” notes Green.

Employees must sometimes open documents from unknown contacts and company networks are also exposed to employees using cloud-based document-sharing sites, which might increase risks.

“Any document might contain malware and the only way to ensure malware-free documents is to reconstruct the file using known and safe elements. Active content and various forms of embedded objects are extracted from the reconstructed file to eliminate any potential threats.”

However, employees are presented with a link to open the documents with macros intact, if required. The document is then opened in Check Point’s Threat Simulation system, which simulates the operating system and programme required to run a document and analyses the processes executed to identify malicious code.

The Threat Simulation system received a boost after Check Point had acquired Israeli start-up HyperWise, which developed a central processing unit-level threat prevention system to block undetected attacks and identify threats before a process is executed.

Edited by Martin Zhuwakinyu
Creamer Media Senior Deputy Editor

Comments

 

Showroom

WearCheck
WearCheck

Leading condition monitoring specialists, WearCheck, help boost machinery lifespan and reduce catastrophic component failure through the scientific...

VISIT SHOWROOM 
Weir Minerals Africa and Middle East
Weir Minerals Africa and Middle East

Weir Minerals Europe, Middle East and Africa is a global supplier of excellent minerals solutions, including pumps, valves, hydrocyclones,...

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Magazine round up | 15 November 2024
Magazine round up | 15 November 2024
15th November 2024

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:3.708 4.171s - 198pq - 2rq
Subscribe Now