News

Check Point introduces Check Point Threat Extraction

Wednesday 11 March 2015 08:49 CET | News

Check Point, a global security vendor, has introduced Check Point Threat Extraction, a new security approach that ensures documents are delivered without malware.

According to the Check Point 2014 Security Report, 84% of companies downloaded an infected document in 2013. The only way to ensure protection is to preemptively remove threats by reconstructing documents with known safe elements. Active content, embedded objects and other exploitable content are simultaneously extracted, and the document is then reconstructed without potential threats to provide safe content.

Check Point Software Technologies is a global pure-play security vendor, protecting customers from cyberattacks. Check Point offers a security architecture defending enterprises networks to mobile devices.


Free Headlines in your E-mail

Every day we send out a free e-mail with the most important headlines of the last 24 hours.

Subscribe now

Keywords: malware, cybercrime, data breaches, threats, online security, Check Point, Check Point Threat Extraction
Categories: Fraud & Financial Crime
Companies:
Countries: World
This article is part of category

Fraud & Financial Crime






Industry Events