Anti-Bot Software Blade

A bot is malicious software that allows cybercriminals to remotely control computers and execute illegal activities such as stealing data, spreading spam and distributing malware. Check Point Anti-Bot security software detects bot-infected machines, prevents bot damages by blocking bot C&C communications, and is continually updated from ThreatCloud, the first collaborative network to fight cybercrime.


Discover bot outbreaks, detect Advanced Persistent Threat (APT) attacks and stop bot damage

  • Detect infected hosts with unique Multi-Tier ThreatSpect™ engine
  • Combine information on remote operator hideouts, botnet communication patterns and attack behavior to accurately identify bot outbreaks
  • Receive up-to-the-minute bot intelligence from the ThreatCloud knowledge base
  • Prevent damage by blocking bot communication between infected hosts and a remote operator

Real-time security intelligence delivered from ThreatCloud

  • Leverage industry's first collaborative network to fight cybercrime
  • Analyze over 75 million addresses daily for bot discovery
  • Dynamically update attack information from worldwide network of sensors and industry’s best malware feeds

First Integrated Anti-Bot Network Solution

  • Integrate all critical threat prevention technologies in a single gateway – IPS, Anti-Virus, Anti-Spam, URL Filtering and Anti-Bot
  • Set policy and view infection reports that are fully integrated with the Check Point Antivirus Software Blade
  • Investigate infections and easily assess damages with extensive forensics tools

Our Check Point solution integrates all the security blades we need, such as Anti-Bot and DLP, so we don’t have to pay $20,000 or more to purchase separate security products. Also, we don’t have to manage devices. Instead, we get a complete view of
the security in one place.

Victor Tu

Director of Network Security

SF Police Credit Union



Complete Anti-Bot solution

Complete Anti-Bot solution – integrated into Check Point Software Blade architecture.

  • Discover, stop and assess bot damages on a single gateway
  • Unified and centralized management
  • Integrated with Check Point Antivirus Software Blade
  • Available on every gateway
  • Optional SandBlast Agent provides Anti-Bot on the endpoint

Multi-Tier ThreatSpect Bot Detection engine

Using Multi-Tier ThreatSpect Bot Detection Engine, the Anti-Bot Software Blade discovers infections by correlating multiple detection methods.

  • Reputation – evaluating IPs, URLs, and DNS addresses to determine whether outbound traffic is destined for known botnet Command and Control (C&C) sites.
  • Patterns – detecting unique botnet family communication patterns (over multiple protocols such as HTTP, DNS and SMTP)
  • Bot damages and actions by detecting attack types, such as spam (leveraging outbound mail analysis) and click fraud, as well as anomalies (irregular ports, protocols)
  • Security intelligence is updated in real-time by ThreatCloud

Integrated malware reports and dashboards

Malware reports and dashboards are integrated with the Antivirus Software Blade with infection summaries and trends to provide better visibility to organizational malware threats and risks

  • View infected hosts statistics, malware types and activities, trends/changes vs. previous week/month, amount of data sent or received and more


Inline bot prevention

Inline bot prevention – block bot communications from infected hosts.

  • Support inline and out-of-band deployment topologies
  • Block bot specific communication to C&C sites to neutralize bot damages
  • Ensure work continuity by blocking only bot traffic, yet allowing good traffic to continue

ThreatCloud real-time security intelligence feeds

ThreatCloud is a collaborative network and cloud-driven knowledge base that delivers real-time dynamic security intelligence to security gateways. That intelligence is used to identify emerging outbreaks and threat trends. ThreatCloud powers the Anti-Bot Software Blade allowing gateways to investigate always-changing IP, URL and DNS addresses where Command and Control Centers are known. Since processing is done in the cloud, millions of signatures and malware protection can be scanned in real time.

The ThreatCloud knowledge base is dynamically updated using feeds from a network of global threat sensors, attack information from worldwide gateways, Check Point research labs and the industry’s best malware feeds. Correlated security threat information is then shared among all gateways collectively.

Extensive forensics

Forensics provides administrators and security teams with the information they need to analyze security events, investigate infections and assess damages.

  • Detailed infection information per malware type and/or infected users and machines
  • Identify bot names, amount of data sent and infection severity
  • Key bot actions – identify suspicious activities such as participating in DDoS attacks, self-distribution attempts, and participating in click fraud
  • Threat Wiki – extensive infection information (malware type, description and any available details such as the executables run, the protocols used etc.)
  • Packet capture – view data sent using complete per-session packet capture with SSL inspection


Extended protection to endpoints

Anti-Bot capabilities are also available in the optional SandBlast Agent, extending post-infection protection to end-user systems, to keep users safe no matter where they go. Malware contracted while roaming outside the network perimeter will be detected, and Command & Control activity blocked. With the addition of SandBlast Agent, more information is available for Anti-Bot detections, including the specific system and process demonstrating suspicious behavior, even when behind a NAT router.

Learn More

This website uses cookies to ensure you get the best experience. More Info Got it, Thanks!