Call a Specialist Today! (02) 9388 1741
Free Delivery! Free Delivery!

The Latest Check Point News
Product and Solution Information, Press Releases, Announcements

Check Point Introduces Threat Extraction for Zero Malware in Zero Seconds
Posted: Tue Mar 10, 2015 01:40:57 PM
 

Check Point

New Anti-Threat Solution Ensures the Fastest 100% Removal of Threats *

SAN CARLOS, CA - Tue, 10 Mar 2015

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the largest pure-play security vendor globally, today introduced Check Point Threat Extraction, a radical new security approach that proactively ensures documents are delivered to a network with zero malware in zero seconds.

Attacks are evolving and increasing every day, however documents still pose one of the highest risks of infection for organizations. According to the Check Point 2014 Security Report, 84% of companies downloaded an infected document in 2013. Companies need to implement stronger defenses against these attacks. The only way to ensure complete protection is to preemptively remove threats by reconstructing documents with known safe elements. Active content, embedded objects and other exploitable content are simultaneously extracted, and the document is then reconstructed without potential threats to provide 100% safe content. With Check Point Threat Extraction, organizations can protect themselves against both known and unknown threats.

“Because the traditional approach of protecting against infected documents by looking for malware and blocking it does not provide absolute protection, organizations need a way to preemptively remove the threat of malware altogether,” said Dorit Dor, vice president of products at Check Point Software Technologies. “With Check Point Threat Extraction, organizations can now defend their networks against threats with a radical new technology that delivers 100% safe documents immediately.”

In addition to receiving zero malware documents, organizations also need to know if they are under attack. Check Point Threat Emulation, Anti-Bot, Intrusion Prevention and Antivirus complement Threat Extraction by detecting malware and providing full visibility and event information to any attack attempts.

* Source: Validated with thousands of “unknown” malware in Check Point Lab Testing as of February 2015

 
« Return to News List