Check Point Endpoint Anti-Malware & Application Control
Efficiently detects and removes malware from laptops and desktops with a single scan
The Check Point Anti-Malware & Program Control Software Blade efficiently detects and removes malware from laptops and desktops with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. Application control allows only approved software programs to run on the endpoint. This software blade is easily managed by unified Endpoint Security Management.
Benefits:
Improves user productivity and frees up system resources
- Industry’s fastest malware and anti-virus scan and boot time
- Smallest memory and disk footprints
- Single-console centralized management
Prevents malware from accessing endpoints with a single scan
- Malware is identified using signatures, behavior blockers, heuristic analysis
- Protection is automatically updated with optional Program Advisor Service
- Knowledge base of more than one million trusted or suspicious programs
Integrated into Check Point Software Blade Architecture
- Flexible licensing options—annual or perpetual
- Centrally managed and deployed
- Activate anti-malware and application control on any Check Point security gateway
Features:
Single Anti-Malware ScanThe Anti-Malware & Application Control Software Blade efficiently detects and removes malware from endpoints with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. With antivirus functionality, the Anti-Malware & Application Control Software Blade stops virus threats before they infect end-users and before they spread.
When compared to other leading anti-malware solutions, Check Point delivers the fastest initial and recurring scan times, fastest system boot time and the smallest memory and disk footprints.
Program ControlApplication control ensures that only legitimate and approved programs are allowed to run and perform tasks on endpoints. Program authenticity is verified to prevent spoofing, altering or hijacking of applications. Application Control automatically creates an inventory of all applications attempting network access, and blocks unauthorized connections and data transfers by malicious programs.
Centralized ManagementThe Anti-Malware & Application Control Software Blade is centrally managed by the Endpoint Policy Management Software Blade, enabling central policy administration, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.
Program Advisor Service for Application ControlThe optional Check Point Program Advisor Service delivers real-time updates to the Anti-Malware & Application Control Software Blade from a knowledge base of more than one million trusted and suspicious programs.
Anti-Malware and Antivirus Policy
Anti-malware and antivirus policy is managed and deployed from a central console, giving administrators full control of scan scheduling and remediation requirements.
Integrated into Check Point Software Blade ArchitectureThe Anti-Malware & Application Control Software Blade is integrated into the Software Blade Architecture. Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from six Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.
Specifications:
Antivirus | |
---|---|
Heuristic Virus Scan | Scans files and identifies infections based on behavioral characteristic of viruses |
On-access Virus Scan | Scans files as they are opened, executed or closed, allowing immediate detection and treatment of viruses |
Deep Scan | Runs a detailed scan of every file on selected scan targets |
Scan Target Drives | Specifies directories and file types to scan |
Scan Exclusions | Specifies directories and file extensions excluded from scanning |
Treatment Options | Choice of remediation: repair, rename, quarantine, delete |
Third-party Antivirus Support | McAfee VirusScan, Symantec Norton Antivirus, Trend Micro PC-cillin/OfficeScan, Sophos Anti-virus, Computer Associates eTrustInnoculateIT, Computer Associates VET, Check Point Endpoint Security Antivirus, Kaspersky Antivirus, NOD32 Antivirus, AVG Antivirus, AVAST Antivirus, BitDefender Antivirus, F-Secure Antivirus, Panda Antivirus, Microsoft OneCare Antivirus |
Anti-spyware | |
Intelligent Quick Scan | Checks the most common areas of the file system and registry for traces of spyware |
Full-systen Scan | Scans local file folders and specific file types |
Deep-inspection Scan | Scans every byte of data on the computer |
Scan Target Drives | Specifies which directories and file types to scan |
Scan Exclusions | Specifies directories and file extensions excluded from scanning |
Treatment Options | Choice of remediation: repair, rename, quarantine, delete |
Documentation:
Download the Check Point Anti-Malware & Application Control Datasheet (PDF).