שיחת ייעוץ חינם: 1-800-800-570

Check Point Endpoint Anti-Malware & Application Control
Efficiently detects and removes malware from laptops and desktops with a single scan

Check Point Compliance Software Blade

The Check Point Anti-Malware & Program Control Software Blade efficiently detects and removes malware from laptops and desktops with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. Application control allows only approved software programs to run on the endpoint. This software blade is easily managed by unified Endpoint Security Management.

Benefits:

Improves user productivity and frees up system resources

  • Industry’s fastest malware and anti-virus scan and boot time
  • Smallest memory and disk footprints
  • Single-console centralized management

Prevents malware from accessing endpoints with a single scan

  • Malware is identified using signatures, behavior blockers, heuristic analysis
  • Protection is automatically updated with optional Program Advisor Service
  • Knowledge base of more than one million trusted or suspicious programs

Integrated into Check Point Software Blade Architecture

  • Flexible licensing options—annual or perpetual
  • Centrally managed and deployed
  • Activate anti-malware and application control on any Check Point security gateway

 

Features:

Single Anti-Malware Scan

The Anti-Malware & Application Control Software Blade efficiently detects and removes malware from endpoints with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis.   With antivirus functionality, the Anti-Malware & Application Control Software Blade stops virus threats before they infect end-users and before they spread.

When compared to other leading anti-malware solutions, Check Point delivers the fastest initial and recurring scan times, fastest system boot time and the smallest memory and disk footprints.

Program Control

Application control ensures that only legitimate and approved programs are allowed to run and perform tasks on endpoints. Program authenticity is verified to prevent spoofing, altering or hijacking of applications. Application Control automatically creates an inventory of all applications attempting network access, and blocks unauthorized connections and data transfers by malicious programs.

Centralized Management

The Anti-Malware & Application Control Software Blade is centrally managed by the Endpoint Policy Management Software Blade, enabling central policy administration, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.

Program Advisor Service for Application Control

The optional Check Point Program Advisor Service delivers real-time updates to the Anti-Malware & Application Control Software Blade from a knowledge base of more than one million trusted and suspicious programs.

Anti-Malware and Antivirus Policy

Anti-malware and antivirus policy is managed and deployed from a central console, giving administrators full control of scan scheduling and remediation requirements.

Integrated into Check Point Software Blade Architecture

The Anti-Malware & Application Control Software Blade is integrated into the Software Blade Architecture. Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from six Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.

Specifications:

Antivirus
Heuristic Virus Scan Scans files and identifies infections based on behavioral characteristic of viruses
On-access Virus Scan Scans files as they are opened, executed or closed, allowing immediate detection and treatment of viruses
Deep Scan Runs a detailed scan of every file on selected scan targets
Scan Target Drives Specifies directories and file types to scan
Scan Exclusions Specifies directories and file extensions excluded from scanning
Treatment Options Choice of remediation: repair, rename, quarantine, delete
Third-party Antivirus Support McAfee VirusScan, Symantec Norton Antivirus, Trend Micro PC-cillin/OfficeScan, Sophos Anti-virus, Computer Associates eTrustInnoculateIT, Computer Associates VET, Check Point Endpoint Security Antivirus, Kaspersky Antivirus, NOD32 Antivirus, AVG Antivirus, AVAST Antivirus, BitDefender Antivirus, F-Secure Antivirus, Panda Antivirus, Microsoft OneCare Antivirus
Anti-spyware
Intelligent Quick Scan Checks the most common areas of the file system and registry for traces of spyware
Full-systen Scan Scans local file folders and specific file types
Deep-inspection Scan Scans every byte of data on the computer
Scan Target Drives Specifies which directories and file types to scan
Scan Exclusions Specifies directories and file extensions excluded from scanning
Treatment Options Choice of remediation: repair, rename, quarantine, delete