Site icon Check Point Blog

Common Zero-Day Network Protection Approaches and Drawbacks (Part 1)

By Mor Ahuvia, Threat Prevention Product Marketing Manager

Can you defend against zero day threats? Most organizations cannot. But with the right technology, organizations can not only detect more zero days, but also stave them off–without having to compromise on business agility or speed. Here is Part 1 of our four part series on “Stopping Zero Days at the Speed of Business.”

At best, antivirus software blocks only 43% of the malware strains currently in the wild, meaning most variants can still get into your network. In absolute numbers, that’s 8,500 unknown zero-day threats worldwide per day, according to Check Point ThreatCloud which aggregates data from several hundred million sensors globally and proprietary Check Point Research.

To identify zero-day malware, AV software relies on indicators of compromise (IoCs) such as IP addresses, URLs and file signature or hashes. The zero-day phishing equivalent of these IoCs, used by anti-spam and email security controls, are unknown URL reputation and sender reputation.

With no associated file signatures, sender or website history, AVs, firewalls and other controls cannot identify these as malicious and block them from entering the network. So how do you defend against that which you do not know?

Common network protection approaches and their limitations

With such critical limitations, how can you protect your network from zero-days?

Learn more:

Exit mobile version