Antivirus Datasheet

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Datasheet:

Antivirus Software Blade

Antivirus Software Blade


Extended Malware Protection—
Powered by ThreatCloud™

Antivirus Software Blade FEATURES


Powered by ThreatCloud™
ThreatCloud is the first collaborative
network to fight cybercrime that feeds
YOUR CHALLENGE security gateway software blades
Modern malware is evolving at an extremely rapid paced. In fact, a new malware is with real-time security intelligence
created nearly every second. Due to the dynamic landscape of ever-growing variants n 250 million addresses analyzed for

of malware, traditional antivirus solutions are becoming less effective. In addition, bot discovery
companies often fight the same attack separately. Global collaboration is needed to n 4.5 million malware signatures

efficiently detect and stop emerging threats. n 300,000 malicious websites

PRODUCT DESCRIPTION Complete Antivirus Solution


The Check Point Antivirus Software Blade helps keep your edge against the growing n Integrated threat prevention in a
number of threats. Using a continually updated list of antivirus signatures and single gateway
anomaly-based protections from ThreatCloud™, the largest real-time security n Up-to-the-minute protection from
threat knowledgebase from the cloud, the Antivirus Software Blade detects and incoming malicious files
stops malware at the gateway before they can affect users. n Unified protection and management
integrated with the Anti-Bot
OUR SOLUTION Software Blade
Check Point Threat Prevention Solutions, including the Antivirus Software Blade, n Available on every gateway
are powered by ThreatCloud™, which feeds the security gateway with up-to-the- n Centrally managed from a single,
second security intelligence with over 250 million addresses analyzed for bot user friendly console
discovery, over 4.5 million malware signatures and over 300,000 malware infested
websites. BENEFITS
n Prevent damage from malware attacks
THREATCLOUD by stopping them at the gateway
ThreatCloud is the first collaborative n Keep up with the ever-changing dynamic
network to fight cybercrime. It delivers threat landscape with real-time intelligence
real-time dynamic security intelligence from ThreatCloud, offering 300X more
to security gateways. That intelligence signatures than previous versions
is used to identify emerging outbreaks n Identify unknown malware by analyzing
and threat trends. ThreatCloud powers suspicious files in a secured environment
the Antivirus Software Blade allowing n View and manage threats with integrated
gateways to investigate in real-time 300X threat reports and dashboards
more malware signatures than previous versions.

ThreatCloud’s knowledgebase is dynamically updated using attack information


from worldwide gateways, feeds from a network of global threat sensors, Check
Point research labs and the industry’s best malware feeds. Correlated security threat
information is then shared among all gateways collectively.

©2012 Check Point Software Technologies Ltd. All rights reserved.


Classification: [Protected] - All rights reserved | 1
Datasheet: Antivirus Software Blade

Stop Incoming Malicious Files


Check Point Antivirus Software Blade prevents and stops 

threats such as malware, viruses, and Trojans from entering
and infecting a network. Multiple malware detection engines
are utilized to protect your network, including signature and
behavioral engines. Malware is identified as it attempts to
get into or out of your network.

Prevent Access to Malicious Websites 



The Antivirus Software Blade scans outbound URL requests
and ensures users do not visit websites that are known
to distribute malware. The gateway information is updated in
real-time with over 300,000 sites from the ThreatCloud.

Discover and Block Unknown Malware


The Antivirus Software Blade can be configured to detect
suspicious executables that may be malicious. By starting View the "big malware picture" with integrated threat reports.
these suspected files in a secured, sandboxed environment,
the Antivirus Software blade can determine if the executable
is malicious by monitoring activities such as attempting Integrated into Check Point
to change an operating system or registry files. If the file is Software Blade Architecture
determined as malicious, the file is blocked from entering The Antivirus Software Blade Software Blade is fully integrated
the network. into the Software Blade architecture, saving time and reducing
costs by allowing customers to quickly expand security
Unified Malware and Bot Protection protections to meet changing requirements. It can be easily and
The Antivirus Software Blade is unified with the Anti-Bot rapidly activated on existing Check Point Security Gateways
Software Blade to give both pre-and post-infection protection saving time and reducing costs by leveraging existing security
to organizations and provide multi-layered threat prevention. infrastructure. The Antivirus Software Blade is centrally
Administrators can manage unified policies and reports all in managed enabling central policy administration, enforcement
a single user interface. and logging from a single, user-friendly console.

SOFTWARE BLADE SPECIFICATIONS


Supported Appliance Families
• Check Point 2200, 4000, 12000, 21400 and 61000* Appliances
• Check Point Power-1
• Check Point IP Appliances
• Check Point UTM-1
• Check Point IAS
Supported Operating Systems
Extensive Forensics.
• GAiA
• SecurePlatform
• IPSO 6.2 Disk-based
• Windows
Antivirus Protection Protocols
HTTP, HTTPS, FTP, POP3 and SMTP
*2H/2012

Worldwide Headquarters
5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@checkpoint.com
CONTACT CHECK POINT U.S. Headquarters
800 Bridge Parkway, Redwood City, CA 94065 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com

©2012 Check Point Software Technologies Ltd. All rights reserved.


April 16, 2012

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy