Check
Point Endpoint Security Anti-Malware & Program Control
Prevents data leakage and encrypts removable media
Endpoint Security Software Blades:
- Full Disk Encryption
- Media Encryption
- Remote Access
- Anti-Malware / Program Control
- WebCheck
- Firewall / Compliance Check (included in container purchase)
*The purchase of an Endpoint container is required per user
*Anti-malware blade does not include support.
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
A Checkpoint User Account number is required to order EndPoint Products.
Please create one here. Please supply the account number in the customer comments.
מחירים נוספים מופיעים למטה, או לחצו כאן!
שימו לב: כל המחירים באתר כוללים מע"מ. החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.
Overview:
The Check Point Anti-Malware & Program Control Software Blade efficiently detects and removes malware from endpoints with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. Program control allows only approved programs to run on the endpoint. This software blade is easily managed by unified Endpoint Security Management.
Improves user productivity and frees up system resources
- Industry’s fastest malware and anti-virus scan and boot time
- Smallest memory and disk footprints
- Single-console centralized management
Prevents malware from accessing endpoints with a single scan
- Malware is identified using signatures, behavior blockers, heuristic analysis
- Protection is automatically updated with optional Program Advisor Service
- Knowledge base of more than one million trusted or suspicious programs
Integrated into Check Point Software Blade Architecture
- Flexible licensing options—annual or perpetual
- Centrally managed and deployed
- Activate anti-malware and program control on any Check Point security gateway
Features & Benefits:
Single Anti-Malware Scan
The Anti-Malware & Program Control Software Blade efficiently detects and removes malware from endpoints with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. With antivirus functionality, the Anti-Malware & Program Control Software Blade stops virus threats before they infect end-users and before they spread.
When compared to other leading anti-malware solutions, Check Point delivers the fastest initial and recurring scan times, fastest system boot time and the smallest memory and disk footprints.
Anti-Malware and Antivirus Policy
Anti-malware and antivirus policy is managed and deployed from a central console, giving administrators full control of scan scheduling and remediation requirements.
Program Control
Program control ensures that only legitimate and approved programs are allowed to run and perform tasks on endpoints. Program authenticity is verified to prevent spoofing, altering or hijacking of applications. Program Control automatically creates an inventory of all applications attempting network access, and blocks unauthorized connections and data transfers by malicious programs.
Program Advisor Service : App Control
The optional Check Point Program Advisor Service delivers real-time updates to the Anti-Malware & Program Control Software Blade from a knowledge base of more than one million trusted and suspicious programs.
Central Management
The Anti-Malware & Program Control Software Blade is centrally managed by the Endpoint Policy Management Software Blade, enabling central policy administration, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.
Integrated into Check Point Software Blade Architecture
The Anti-Malware & Program Control Software Blade is integrated into the Software Blade Architecture. Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from six Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.
Deployment:
Specifications:
Software Blade Specifications
Client Platform Support: | |
Operating Systems |
|
Client Language Support: | |
Languages |
|
Anti-Malware Scanning
Antivirus | |
Heuristic Virus Scan | Scans files and identifies infections based on behavioral characteristic of viruses |
On-access Virus Scan | Scans files as they are opened, executed or closed, allowing immediate detection and treatment of viruses |
Deep Scan | Runs a detailed scan of every file on selected scan targets |
Scan Target Drives | Specifies directories and file types to scan |
Scan Exclusions | Specifies directories and file extensions excluded from scanning |
Treatment Options | Choice of remediation: repair, rename, quarantine, delete |
Third-party Antivirus Support | McAfee VirusScan, Symantec Norton Antivirus, Trend Micro PC-cillin/OfficeScan, Sophos Anti-virus, Computer Associates eTrustInnoculateIT, Computer Associates VET, Check Point Endpoint Security Antivirus, Kaspersky Antivirus, NOD32 Antivirus, AVG Antivirus, AVAST Antivirus, BitDefender Antivirus, F-Secure Antivirus, Panda Antivirus, Microsoft OneCare Antivirus |
Anti-spyware | |
Intelligent Quick Scan | Checks the most common areas of the file system and registry for traces of spyware |
Full-systen Scan | Scans local file folders and specific file types |
Deep-inspection Scan | Scans every byte of data on the computer |
Scan Target Drives | Specifies which directories and file types to scan |
Scan Exclusions | Specifies directories and file extensions excluded from scanning |
Treatment Options | Choice of remediation: repair, rename, quarantine, delete |
Documentation:
Download the Check Point Software Blade Architecture Brochure (PDF).
הערות תמחור:
- שימו לב: כל המחירים באתר כוללים מע"מ.
- החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.
- מחירי המוצרים וזמינותם כפופים לשינויים ללא הודעה מוקדמת.
*The purchase of an Endpoint container is required per user
*Anti-malware blade does not include support.
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר