Endpoint Protection
and Threat Prevention

Today’s borderless networks are redefining endpoint protection. With a variety of endpoints freely accessing networks, they’re storing sensitive corporate data. Because 70 percent of successful data breaches start on endpoints,1  a preventative approach to endpoint security can help stop cyber attacks. SandBlast Agent is the advanced endpoint protection and threat prevention solution to protect your organization.

1 “Cybercrime: The Credential Connection,” IDC

Endpoint and Threat Protection: SandBlast Agent monitor image
Innovative Technology icon

Innovative Threat Prevention Technologies

Uses static, dynamic, and behavioral detection and prevention technologies with advanced artificial intelligence to provide high catch rates and low false positives

Detect Response icon

Insightful Detection and Response

Assures continuous collection of comprehensive and complete raw forensics data, employing full attack remediation capabilities

Complete Solution icon

Complete Endpoint Security Solution

Integrates into Check Point Infinity to get maximum prevention across all attack surfaces, shared intelligence, and a single point of management (cloud service or on premise)

Video Guide: How to Secure Your Remote Workforce

From recent attack trends to best practices for mobile, endpoint and cloud email security, our 8-part video guide is everything security admins need to secure the remote workforce in the new normal, and beyond.

Watch the Product Tour

Watch the on-demand video to get a first-hand experience of all the features and capabilities of SandBlast Agent.

SandBlast Agent Features

SandBlast Agent is a complete endpoint security solution offering a fleet of advanced endpoint threat prevention capabilities so you can safely navigate today’s menacing threat landscape.

It provides a comprehensive system to proactively prevent, detect, and remediate evasive malware attacks.

SandBlast Agent Endpoint and Threat Protection: Complete Endpoint Security Solution feature capabilities diagram
SandBlast Agent Endpoint and Threat Protection: Threat Emulation screen capture
Threat Emulation

Evasion-resistant sandbox technology detects malicious behavior and prevents potential attacks

SandBlast Agent Endpoint and Threat Protection: Threat Extraction screen capture
Threat Extraction

Reconstructs downloaded files, delivering clean, risk-free files to users in real time

SandBlast Agent Endpoint and Threat Protection: Anti-Exploit screen capture

Protects and prevents vulnerable applications and systems from exploit attacks

SandBlast Agent Endpoint and Threat Protection: Anti-Bot screen capture

Detects, contains, and remediates infected hosts

SandBlast Agent Endpoint and Threat Protection: Zero-Phising screen capture

Blocks deceptive phishing sites and alerts on password reuse in real time

SandBlast Agent Endpoint and Threat Protection: Behavioral Guard screen capture
Behavioral Guard

Prevents, detects, and remediates even the most evasive attacks

SandBlast Agent Endpoint and Threat Protection: Anti-Ransomware screen capture

Detects and quarantines the most evasive ransomware variants

SandBlast Agent Endpoint and Threat Protection: Forensics screen capture

Records and analyzes all endpoint events to provide actionable attack forensic report


Additional Features

Protects endpoints from known viruses, worms, and Trojan horse malware and it serves as the baseline endpoint threat prevention engine against known attacks using signature and heuristics.

Provides maximum data protection by automatically encrypting all information on the hard drive, including user data, operating system files, and temporary and erased files. Combines pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops. Blocks unauthorized attempts to copy individual files or introduce rogue programs.

Protects data stored on the computers by encrypting removable media devices and allowing tight control over computers’ ports (USB, Bluetooth, and so on).

Provides secure, seamless, and remote access to corporate networks.

Stops unwanted traffic, prevents malware, and blocks targeted attacks, ensuring protected computers comply with security requirements; assigns different security levels according to the compliance state of the endpoint computer.

Shipping Logistics Leader IMC Deploys Check Point SandBlast Agent to Safeguard Supply Chain Data

“The biggest advantage to using Check Point SandBlast Agent is that we don’t need to worry about ransomware attacks on our environment. It provides total peace of mind, and you can’t put a price tag on that. We know it will be there, and that our data will remain safe”

– David Ulloa, Chief Information Security Officer, IMC Companies

Alrov Luxury Hotels protects against cyber threats with Check Point to ensure flawless guest experience

“We tested 30 endpoint servers by injecting malware to test the level of protection. SandBlast Agent detected and blocked every single one.”

– Moshe Revivo, CTO, Alrov Luxury Hotels

Mississippi Secretary of State Gains End to End Advanced Threat Protection for Its Data

“Since we deployed SandBlast Agent, we have not had a single advanced malware or ransomware incident in almost a year.”

– Russell Walker, Chief Technology Officer, Mississippi Secretary of State

Cloud Management or On-premise

SandBlast Agent offers unified, scalable, and granular management available as a cloud service or installed on your premise.

  • Unified – Manage all your endpoint security needs from a single console
  • Scalable – Use one management infrastructure to manage your endpoints, from a few to hundreds of thousand devices
  • Granular – Choose the management granularity that fits your needs. Relay product best practices based on defaults; go deeper by configuring everything on your system, or anywhere in between

SandBlast Agent cloud management service is fully deployed,maintained, and optimized by Check Point enabling rapid deployment, elastic growth, continuous updates and location independent.

SandBlast Agent Options and Specifications

Reduce Attack Surface
  • Host Firewall
  • Application Control
  • Compliance
NGAV: Prevent Attacks Before They Run
  • Anti-Malware
  • ML based NGAV
  • Anti-Exploit
  • Zero-Phishing Protection
NGAV: Runtime Detection and Protection
  • Anti-Ransomware
  • Behavioral Guard
  • Anti-Bot
  • Anti-Exploit
Web Protection
  • Zero-day Phishing site protection
  • Corporate Password Reuse Protection
  • URL Filtering
  • Malicious site protection
Attack Investigation and Response
  • Forensics collection and detection
  • Forensics report - incident visibility, MITRE mapping
  • Automated attack chain full sterilization
  • Ransomware encrypted files restoration
VPN Access
  • Remote Access VPN
Threat Intelligence
  • Powered by ThreatCloud™
  • Automated IoC and IoA cloud sharing
Centralized Management
  • Cloud Management
  • On-Prem Management *
  • Standard Pro Support (5*9)

Content Disarm & Reconstruction (CDR) across email and web
  • Threat Emulation (sandBox)
  • Threat Extraction (Sanitizes files in 1.5 seconds)
Data Protection
  • Host Encryption
  • Media Encryption
    Port Protection
Mobile Protection
  • iOS Protection
  • Android Protection
+ +
Incident Response Service

+ + +
* SandBlast Agent on-premises Server is at additional cost

Try it now

Talk to a specialist

Get pricing

0/5 (0 Reviews)
This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO