Product Id: 25227425
Description: Check Point Antivirus & Anti-Malware Software Blade - Subscription license ( 1 year ) - mid appliances
Mfr Part #: CPSB-AV-M-1Y
Viruses are a major threat to businesses. They have become more dangerous and sophisticated, and have evolved into worms, blended threats (which use combinations of malicious code and vulnerabilities for infection and spread) and Trojans.
Check Point Antivirus & Anti-Spyware Software Blade protects against threats transmitted through HTTP, FTP, SMTP and POP3 protocols. Using a continually updated list of antivirus and antispyware signatures and anomaly-based protections, the Antivirus & Anti-Malware Software Blade stops viruses and other malware at the gateway before they affect users. Businesses gain the benefits of the easy management using the familiar Check Point user interfaces that includes policy management, logging and monitoring. By default all protocols are scanned, and options for each protocol can be centrally configured.
- Stops virus threats before they infect end users and before they spread
- Protects the enterprise against productivity and data loss
- Continually updates for real-time protection against emerging threats
- Simple configuration and low-overhead management
- Real-time antivirus and anti-malware scanning at the gateway
Because the Antivirus & Anti-Malware Software Blade is installed at the gateway, it can stop infections before they have a chance to affect users. This eliminates the cost of remediation, work outages and sensitive data loss.
- Continuous download scanning
Continuous download scanning analyzes files for infection as they are downloaded. If a virus is detected during the scan, file delivery to the client is immediately terminated, preventing the infection from taking hold. Specific file types can be excluded from continuous download scanning if needed.
- Scan by direction
Scan by direction allows users to detect and scan files moving in a particular direction such as to or from external network or when crossing as DMZ. Configuration is done by direction, not by host, enabling security managers to enforce broader policies with simpler rules. Exceptions are also supported. These allow specific users or network devices to transfer files unfettered.
- Centralized and granular policy configuration and enforcement
Network-wide policies can be configured centrally once and then applied across the entire security domain. These include highly granular policies that, for example, designate which specific network connections are to be scanned.
- Archived file support
As archived files flow over the network they are decompressed and scanned for viruses and mal-ware in real-time. Archives, including nested archives, of any size are supported.