Antivirus Software Blade
Real-time security intelligence delivered from ThreatCloud
- Leverage the industry's first collaborative network to fight cybercrime
- Identify over 4.5 Million malware signatures and 300,000 malicious websites
- Dynamically update attack information from worldwide network of sensors and industry’s best malware feeds
- Enhanced by Threat Emulation detection zero-day signatures
Prevent damage from malware attacks by stopping them at the gateway
- Stop incoming malicious files with 300x more signatures than previous versions
- Prevent access to malware infested websites
- Receive up-to-the-minute malware intelligence from the ThreatCloud knowledgebase
Integrated into Check Point Software Blade Architecture
- Activate Antivirus Software Blade on any Check Point security gateway
- Saves time and reduces costs by leveraging existing security infrastructure
- View and manage the "big malware picture" with integrated threat reports and dashboards with Anti-Bot Software Blade
ThreatCloud™ Real-time Security Intelligence Feeds
ThreatCloud is a collaborative network and cloud-driven knowledge base that delivers real-time dynamic security intelligence to security gateways. ThreatCloud powers the Antivirus Software Blade allowing gateways to investigate always-changing malware signatures.
ThreatCloud is a collaborative network and cloud-driven knowledge base that delivers real-time dynamic security intelligence to security gateways. That intelligence is used to identify emerging outbreaks and threat trends. ThreatCloud powers the Antivirus Software Blade allowing gateways to investigate always-changing malware signatures. Since processing is done in the cloud, millions of signatures and malware protection can be scanned in real time.
ThreatCloud’s knowledgebase is dynamically updated using attack information from worldwide gateways, feeds from a network of global threat sensors, Check Point research labs and the industry’s best malware feeds. Correlated security threat information is then shared among all gateways collectively.
Stop Incoming Malware Attacks
Check Point Antivirus Software Blade stops incoming malware attacks with 300x more signatures than previous versions. New Threat Emulation technology also delivers zero-day signatures to Threat Cloud, which makes Anti-Virus even more powerful
Check Point Antivirus Software Blade stops incoming malware attacks with 300x more signatures than previous versions. Multiple malware detection engines are utilized to protect your network, including signature, behavioral and reputation engines. Check Point security intelligence constantly feeds its ThreatCloud database with real-time data, allowing identification of outbound connections to resources that known to contain malicious content.
Prevent Access to Malicious Websites
The Antivirus Software Blade scans outbound URL requests and ensures users do not visit websites that are known to distribute malware.
The Antivirus Software Blade scans outbound URL requests and ensures users do not visit websites that are known to distribute malware. The knowledgebase is updated in real-time with over 300,000 sites from the ThreatCloud and is constantly updated.
Integrated Malware Reports and Dashboards
Malware reports and dashboards are integrated with the Anti-Bot Software Blade with infection summaries and trends to provide better visibility to organizational malware threats and risks
Malware reports and dashboards are integrated with the Anti-Bot Software Blade with infection summaries and trends to provide better visibility to organizational malware threats and risks
- View infected hosts statistics, malware types and activities, trends/changes vs. previous week/month, amount of data sent or received and more

Summary of infected hosts
Extensive Forensics
Forensics - Provide administrators and security teams with the information they need to analyze security events, investigate infections and assess damages
Forensics - Provide administrators and security teams with the information they need to analyze security events, investigate infections and assess damages
- Detailed infection information per malware type and/or infected users and machines
- Identify malware names and infection severity
- Threat Wiki – extensive infection information (malware type, description and any available details such as executables run, used protocols etc.)
- Packet capture – view data sent using complete per-session packet capture with SSL inspection

Extensive Forensics
Inspect SSL Encrypted Traffic
Scan and secure SSL encrypted traffic passing through the gateway.
Scan and secure SSL encrypted traffic passing through the gateway. When traffic is passed through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver.
Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy. Some encrypted content passing through the gateway should not be inspected, and therefore can be bypassed with a simple administrator policy definition.
Specifications
| Supported Appliance Families | |
|---|---|
|
|
| Supported Operating Systems | |
|
| Antivirus Protection Protocols | |
|---|---|
|
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite


