Home Page | Skip to Navigation | Skip to Content | Skip to Search | Skip to Footer

Introducing Check Point Threat Emulation

The Threat Emulation Software Blade prevents infections from undiscovered exploits, zero-day and targeted attacks. This innovative solution quickly inspects suspicious files, emulates how they run to discover malicious behavior and completely prevents malware from entering the network.

Check Point Threat Emulation also immediately reports new threats to Check Point's ThreatCloud service and automatically shares the newly identified threats with other customers.


 

How does Threat Emulation work?


 
 

Flexible deployment in the cloud or dedicated appliance

Check Point Threat Emulation provides customers with flexible deployment options. Inspecting files on any Check Point Security Gateway and emulating these files on either an on-site dedicated appliance or through a cloud-based service.