Anti-Malware & Program Control

FREE Compliance Analysis Tool
Improves user productivity and frees up system resources
- Industry’s fastest malware and anti-virus scan and boot time
- Smallest memory and disk footprints
- Single-console centralized management
Prevents malware from accessing endpoints with a single scan
- Malware is identified using signatures, behavior blockers, heuristic analysis
- Protection is automatically updated with optional Program Advisor Service
- Knowledge base of more than one million trusted or suspicious programs
Integrated into Check Point Software Blade Architecture
- Flexible licensing options—annual or perpetual
- Centrally managed and deployed
- Activate anti-malware and program control on any Check Point security gateway
Single Anti-Malware Scan
The Anti-Malware & Program Control Software Blade efficiently detects and removes malware from endpoints with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. With antivirus functionality, the Anti-Malware & Program Control Software Blade stops virus threats before they infect end-users and before they spread.
When compared to other leading anti-malware solutions, Check Point delivers the fastest initial and recurring scan times, fastest system boot time and the smallest memory and disk footprints.
Anti-Malware and Antivirus Policy
Anti-malware and antivirus policy is managed and deployed from a central console, giving administrators full control of scan scheduling and remediation requirements.

Central console for anti-malware and antivirus policy
Program Control
Program control ensures that only legitimate and approved programs are allowed to run and perform tasks on endpoints. Program authenticity is verified to prevent spoofing, altering or hijacking of applications. Program Control automatically creates an inventory of all applications attempting network access, and blocks unauthorized connections and data transfers by malicious programs.

Program control permissions
Program Advisor Service : App Control
Centralized Management
Integrated into Check Point Software Blade Architecture
Software Blade Specifications
| Client Platform Support | |
|---|---|
| Operating Systems | Windows 8 (32 & 64-bit) Windows 7 (32 & 64-bit) Windows Vista (32 & 64-bit) Windows XP Pro (32-bit, SP2, SP3) |
| Client Language Support | |
| Languages | English Japanese French Italian German Chinese (simplified) Spanish Russian |
| Management Platform |
|---|
| See Endpoint Policy Management Software Blade |
Anti-Malware Scanning
| Antivirus | |
|---|---|
| Heuristic Virus Scan | Scans files and identifies infections based on behavioral characteristic of viruses |
| On-access Virus Scan | Scans files as they are opened, executed or closed, allowing immediate detection and treatment of viruses |
| Deep Scan | Runs a detailed scan of every file on selected scan targets |
| Scan Target Drives | Specifies directories and file types to scan |
| Scan Exclusions | Specifies directories and file extensions excluded from scanning |
| Treatment Options | Choice of remediation: repair, rename, quarantine, delete |
| Third-party Antivirus Support | McAfee VirusScan, Symantec Norton Antivirus, Trend Micro PC-cillin/OfficeScan, Sophos Anti-virus, Computer Associates eTrustInnoculateIT, Computer Associates VET, Check Point Endpoint Security Antivirus, Kaspersky Antivirus, NOD32 Antivirus, AVG Antivirus, AVAST Antivirus, BitDefender Antivirus, F-Secure Antivirus, Panda Antivirus, Microsoft OneCare Antivirus |
| Anti-spyware | |
| Intelligent Quick Scan | Checks the most common areas of the file system and registry for traces of spyware |
| Full-systen Scan | Scans local file folders and specific file types |
| Deep-inspection Scan | Scans every byte of data on the computer |
| Scan Target Drives | Specifies which directories and file types to scan |
| Scan Exclusions | Specifies directories and file extensions excluded from scanning |
| Treatment Options | Choice of remediation: repair, rename, quarantine, delete |
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite


