Quick tech specs
- Security appliance
- Threat Extraction
- 8 virtual machines
- 1U
- with 1 year Threat Emulation
- Antivirus and Anti-Bot Annual Service
- GigE
- rack-mountable
Know your gear
Your challenge with the increase in sophistication of cyber threats, many targeted attacks begin with exploiting software vulnerabilities in downloaded files and email attachments. These threats include exploits, or even variants of known exploits unleashed almost daily with no existing signatures and therefore no standard solutions to detect those variants.
ThreatCloud Emulation prevents infections from undiscovered exploits, zero-day and targeted attacks. This innovative solution quickly inspects files and run them in a virtual sandbox to discover malicious behavior. Discovered malware is prevented from entering the network. Check Point ThreatCloud Emulation reports to the ThreatCloud service and automatically shares the newly identified threat information with other Check Point customers. Traditional solutions have focused on detection, providing notifications after a threat has breached the network. With Check Point ThreatCloud Emulation, threats are blocked and infection does not occur.
ThreatCloud Emulation prevents infections from undiscovered exploits, zero-day and targeted attacks. This innovative solution quickly inspects files and run them in a virtual sandbox to discover malicious behavior. Discovered malware is prevented from entering the network. Check Point ThreatCloud Emulation reports to the ThreatCloud service and automatically shares the newly identified threat information with other Check Point customers. Traditional solutions have focused on detection, providing notifications after a threat has breached the network. With Check Point ThreatCloud Emulation, threats are blocked and infection does not occur.
Contact Sales Assistance
(800) 800-4239, Monday-Friday 7am-7:30pm CT
(800) 800-4239, Monday-Friday 7am-7:30pm CT