The Check Point Anti-Malware & Program Control Software Blade efficiently detects and removes malware from laptops and desktops with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. Program control allows only approved programs to run the endpoint. This software blade is easily managed by unified Endpoint Security Management.

Benefits

Improves user productivity and frees up system resources
  • Industry’s fastest malware and anti-virus scan and boot time
  • Smallest memory and disk footprints
  • Single-console centralized management
Prevents malware from accessing endpoints with a single scan
  • Malware is identified using signatures, behavior blockers, heuristic analysis
  • Protection is automatically updated with optional Program Advisor Service
  • Knowledge base of more than one million trusted or suspicious programs
Integrated into Check Point Software Blade Architecture
  • Flexible licensing options—annual or perpetual
  • Centrally managed and deployed
  • Activate anti-malware and program control on any Check Point security gateway

Features

The Anti-Malware & Program Control Software Blade efficiently detects and removes malware from endpoints with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis.   With antivirus functionality, the Anti-Malware & Program Control Software Blade stops virus threats before they infect end-users and before they spread.

When compared to other leading anti-malware solutions, Check Point delivers the fastest initial and recurring scan times, fastest system boot time and the smallest memory and disk footprints.

Anti-malware and antivirus policy is managed and deployed from a central console, giving administrators full control of scan scheduling and remediation requirements.

Central console for anti-malware and antivirus policy

Program control ensures that only legitimate and approved programs are allowed to run and perform tasks on endpoints. Program authenticity is verified to prevent spoofing, altering or hijacking of applications. Program Control automatically creates an inventory of all applications attempting network access, and blocks unauthorized connections and data transfers by malicious programs.

Program control permissions

The optional Check Point Program Advisor Service delivers real-time updates to the Anti-Malware & Program Control Software Blade from a knowledge base of more than one million trusted and suspicious programs.

The Anti-Malware & Program Control Software Blade is centrally managed by the Endpoint Policy Management Software Blade, enabling central policy administration, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.

The Anti-Malware & Program Control Software Blade is integrated into the Software Blade Architecture. Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from six Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.

Specifications

Client Platform Support
Operating SystemsWindows 8 (32 & 64-bit)
Windows 7 (32 & 64-bit)
Windows Vista (32 & 64-bit)
Windows XP Pro (32-bit, SP2 and later)
Windows Server 2003 32-bit - Compliance only Windows Server 2008 (32 & 64-bit)
Windows Server 2008 R2 (32 & 64-bit)
Client Language Support
LanguagesEnglish
Japanese
French
Italian
German
Chinese (simplified)
Spanish
Russian
Management Platform
See Endpoint Policy Management Software Blade
Antivirus
Heuristic Virus ScanScans files and identifies infections based on behavioral characteristic of viruses
On-access Virus ScanScans files as they are opened, executed or closed, allowing immediate detection and treatment of viruses
Deep ScanRuns a detailed scan of every file on selected scan targets
Scan Target DrivesSpecifies directories and file types to scan
Scan ExclusionsSpecifies directories and file extensions excluded from scanning
Treatment OptionsChoice of remediation: repair, rename, quarantine, delete
Third-party Antivirus SupportMcAfee VirusScan, Symantec Norton Antivirus, Trend Micro PC-cillin/OfficeScan, Sophos Anti-virus, Computer Associates eTrustInnoculateIT, Computer Associates VET, Check Point Endpoint Security Antivirus, Kaspersky Antivirus, NOD32 Antivirus, AVG Antivirus, AVAST Antivirus, BitDefender Antivirus, F-Secure Antivirus, Panda Antivirus, Microsoft OneCare Antivirus
Anti-spyware
Intelligent Quick ScanChecks the most common areas of the file system and registry for traces of spyware
Full-systen ScanScans local file folders and specific file types
Deep-inspection ScanScans every byte of data on the computer
Scan Target DrivesSpecifies which directories and file types to scan
Scan ExclusionsSpecifies directories and file extensions excluded from scanning
Treatment OptionsChoice of remediation: repair, rename, quarantine, delete