|
楼主 |
发表于 2009-3-2 00:29:17
|
显示全部楼层
Features(特性)
Malicious Code Protector™ (恶意代码保护者)
Advanced streaming inspection (高级流检查)
Simple deployment and management (简单的部署和管理)
Seamless integration into Check Point Security Gateways (与Check Point安全网关无缝集成)
Malicious Code Protector (恶意代码保护者)
Check Point’s patent-pending Malicious Code Protector offers a revolutionary way of identifying buffer overflow, heap overflows, and other malicious executable code attacks that target Web servers and other applications without the need of signatures. Malicious Code Protector can detect malicious executable code within Web communications by identifying not only its existence within a data stream but its potential for malicious behavior. Malicious Code Protector performs four important actions:
Check Point恶意代码保护者(专利申请中)提供了革命性的方法识别缓存溢出,堆栈溢出,和其他恶意可执行代码等针对Web服务器和其他的应用,并且不需要签名。恶意代码保护者能检测Web通讯中的恶意可执行代码,实现方式为:通过识别在恶意代码数据流中的存在和它的潜在恶意行为。恶意代码保护者提供了四个重要功能:
² Monitors Web communication for potential executable code (监视Web通讯的潜在恶意代码)
² Confirms the presence of executable code (确认存在的可执行代码)
² Identifies whether the executable code is malicious (识别可执行代码是否是恶意的)
² Blocks malicious executable code from reaching a target host (阻止恶意可执行代码到达目标主机)
Malicious Code Protector identifies both known and unknown attacks, offering preemptive attack protection. Moreover, this level of protection does not come at the price of performance degradation because Malicious Code Protector is offered at the kernel level, delivering wire-speed throughput.
恶意代码保护者识别已知和未知的攻击,提供优先攻击保护。此外,这种水平的保护不会以性能损失为代价,因为恶意代码保护者提供在核心层,以线速的吞吐量处理。
Advanced Streaming Inspection(高级流检查)
Advanced Streaming Inspection is a Check Point kernel-based technology that processes the overall context of communication. This technology can make real-time security decisions based on session and application information, and protects Web communication even when it spans multiple TCP segments. Process-intensive application inspections are offloaded to the kernel, dramatically improving throughput and connection rates.
高级流检查是Check Point的基于内核的技术,处理总体框架的沟通。这种技术实现了基于会话和应用程序信息的实时安全检测,保护了web通讯,甚至当它分成多个TCP分段。进程密集型的应用检查从核心中剥离,极大地提高了吞吐量和连接的速率。
Advanced Streaming Inspection uses Active Streaming technology, which has the capability to modify the content of a Web connection on the fly. This important capability offers several unique advantages to Check Point customers. Active Streaming uses HTTP header-spoofing capability, providing a first level of defense by hiding important site-specific properties about the Web environment. These properties often include the names and versions of operating systems, and identity Web servers and backend servers. This information is typically useless to end users, but extremely valuable to attackers who are trying to gather information about their target. The Web Security Software Blade can intercept a Web response that contains a server’s identity and gives the administrator the option to either completely hide such disclosure or optionally change the stream to confuse attackers.
高级流检查使用活动流技术,具有在线编辑web连接内容的能力。这种重要的能力为Check Point客户提供了几个独一无二的优点。活动流利用HTTP头部欺骗能力,提供第一道防线,隐藏了关于web环境中的重要站点属性,这些属性也包括了操作系统的版本和名字,web服务器和后端服务器的身份。这些信息一般对终端用户是无用的,但对于攻击者是极有价值的,他们正试图收集关于他们目标的信息。Web安全软件刀片能拦截包含服务器身份的web响应,并且为管理员给出一个选项是否完全隐藏这种公开消息,或者改变流以混淆攻击的选项。
Administrators can improve the end-user experience with Active Streaming by predefining custom error pages. To most users, generic error status codes are meaningless. Active Streaming redirects the end user to a custom-defined error page with meaningful helpdesk hints. This feature dramatically improves the end-user experience and reduces helpdesk costs.
管理员使用活动流提高了终端用户的体验,提供预定义的错误页面。对于大多数用户,产生错误状态代码是没有意义的。活动流将终端用户重定向到客户定义的错误页面,提供了有意义的帮助提示。这个特性极大的提高了终端用户的体验,减少了服务成本。
Simple Deployment and Management(简单的部署和管理)
Web Security management within Check Point Security Gateways is fully integrated into the management GUI. The user interface is preconfigured with protections to counter known common attacks—each with attack and defense descriptions. Because each Web application server is different from others in its security requirements, the Web Security Software Blade offers the capability to configure granular security for different Web applications and Web servers. First-time configuration of the Software Blade takes just minutes. Monitor-only mode allows smooth security deployment without the risk of rejecting connections to mission-critical applications due to misconfiguration of a security policy.
Check Point安全网关内的Web安全管理完全集成进管理图形用户接口(GUI)。用户接口是预先配置好的,提供了抵抗已知的普通攻击(每一种包含了攻击和防御描述)。因为每一个web应用服务器的安全需求各不相同,web安全刀片为不同Web应用和Web服务器提供了细粒度的安全配置。第一次配置软件刀片仅花费几分钟的时间。仅监视的模式允许您平滑的安全部署,消除了错误的安全策略配置对关键业务应用影响的风险。
Seamless Integration with Other Software Blades(与其它软件刀片无缝集成)
The Web Security Software Blade is tightly integrated other Check Point Software Blades, and does not require installation on additional devices. Security and audit logs are integrated into Check Point reporting, auditing, and log architecture, providing administrators a powerful tool to centrally analyze security violations.
Web安全软件刀片与其它Check Point软件刀片高度集成,不要求安装在另外的设备上。安全和审计日志集成进Check Point报告,审计和日志架构,为管理员提供了一个强大的工具去集中分析安全违例。
[ 本帖最后由 liuxingyuan 于 2009-3-2 00:30 编辑 ] |
|