Developers: | Check Point Software Technologies |
Date of the premiere of the system: | 2015/03/12 |
Technology: | Cybersecurity - Antiviruses, cybersecurity - the Antispam |
Threat Extraction is technology of pro-active monitoring of documents. System developers guarantee emergence of documents in network of the organization without malware, in the shortest possible time.
On March 12, 2015 the Check Point Software Technologies company announced a release of the solution of protection of Check Point Threat Extraction.
With growth of intensity and number of the hacker attacks on network resources, increase in their complexity, documents and files of users - some of the most dangerous sources of infection for the organizations. Therefore the companies need to implement more serious protection against the similar attacks.
The only way of full protection, according to Check Point Software Technologies developers — prevention of threats due to reconstruction of documents on the basis of the known and safe elements.
Active content, the built-in objects and other elements which can be used by malefactors are taken from the document then it forms again without potential threats and for 100% consists of safe content. By means of use of Check Point Threat Extraction of the company can protect themselves, both from known, and from yet not the known threats.
Settings window of the program, 2015
In addition to an opportunity to open documents without malicious code, the companies need also to obtain information on the operating attacks, their types, to opposition to it and effects. The Check Point Threat Emulation, Anti-Bot, Intrusion Prevention and Antivirus systems supplement the solution Threat Extraction. They detect the malware, guarantee complete transparency and provide the comprehensive information about attempts of carrying out the attacks.
Availability
The solution Check Point Threat Extraction will be available in a set of Next Generation Threat Prevention, NGTX, in the second quarter 2015.