Highest Level of Security for Remote Users
With remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding.
Check Point Harmony is the industry’s first unified security solution for users devices and access.
It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.
Complete protection for cloud-based email environments from known and unknown threats
• Extend industry-leading zero-day protection with the highest malware catch rates and evasion resistant CPU-level technology to your cloud email environments
• Threat Emulation and Threat Extraction proactively prevent new, unknown and zero-day threats delivered via emails and file attachments
• Antivirus and URL Reputation leverage information from ThreatCloud™ intelligence ecosystem to block the latest signature-based threats
Fast and transparent user experience
• All content is analyzed in the cloud without changing the end-user’s experience
• Rapid reconstruction of files provides end-user’s with immediate access to safe content
• Protects across the widest range of documents and common file-typesEasy to deploy and manage
• Seamless integration with existing infrastructure
• Pure cloud-based solution speeds up installation and deployment
• Full visibility and policy customization through the cloud-based management portal
Industry-leading security for Office 365 cloud email
CloudGuard provides industry-leading Check Point security protections to organizations using Microsoft Office 365 cloud-based email. This comprehensive solution blocks known threats using tools like Antivirus and URL Reputation to secure users from the latest malicious files and infested websites. Using Threat Emulation and Threat Extraction, CloudGuard brings the highest catch rate and proactive protection from unknown attacks to cloud-based email.
Identify and prevent more malware
The Threat Emulation engine within CloudGuard intercepts and filters inbound files, including any files originating from URLs within emails by running them in a virtual environment. File behavior is inspected simultaneously across multiple operating systems and versions. Files engaging in suspicious activity commonly associated with malware, such as modifying the registry, network connections, and new file creation are flagged and further analyzed. Malicious files are prevented from reaching users.
Evasion resistant detection using cutting edge CPU-level technology
Unlike other solutions, the CloudGuard technology used within Check Point Cloud uses a unique technology that does inspection at the CPU-level to stop attacks before they have a chance to launch.
There are thousands of vulnerabilities and millions of malware implementations, but there are very few methods that cyber criminals utilize to exploit vulnerabilities. The Threat Emulation engine monitors CPU-based instruction flow for exploits attempting to bypass operating system and hardware security controls.
By detecting exploit attempts during the pre-infection stage, the Threat Emulation engine stops attacks before they have a chance to evade detection by the sandbox.
Detailed reports for full visibility into security threats
A detailed report is generated for each file emulated and found to be malicious. The easy to understand report includes file details and information about any abnormal activity or malicious attempts originated by running the file. The report provides actual screenshots of the environment while running the file for any operating system on which it was simulated.
Threatcloud™ intelligence ecosystem
Newly discovered threats are sent to the ThreatCloud intelligence database. Each newly discovered threat signature is distributed across the ThreatCloud ecosystem to protect other Check Point connected gateways. This enables connected gateways to block the new threat before it has a chance to become widespread. Constant collaboration makes ThreatCloud the most advanced and up-to-date threat Intelligence network available.
Prompt delivery of safe content to end-users
The Threat Extraction component within CloudGuard immediately eliminates any potential threats transported through files by removing risky content such as macros or embedded scripts and then reconstructs the document using only known safe elements.
Unlike detection technologies that require time to analyze and identify threats before blocking them, Threat Extraction preemptively eliminates risk, ensuring prompt delivery of safe documents to end-users.
Transparent user experience
All content is analyzed in the cloud before it is delivered to the user’s inbox, ensuring that end-users have a consistent experience without the need for any additional actions or complexity.
In formats that have undergone Threat Extraction, a link provides the user with self-service ability to download the original after emulation is complete.
Protects most common file types
CloudGuard protects a wide range of the most common document types used in organizations today, from Microsoft Office Word, Excel, Power Point, and Adobe PDFs to Archive files.
Easy to deploy and manage
As organizations adopt Office 365 cloud-based email, they require a solution that seamlessly integrates with their existing infrastructure. Check Point CloudGuard has an API-level integration with Microsoft Office 365, enabling it to be implemented as a complete cloud solution that won’t interfere with your email delivery, or require any on-premise hardware.
The cloud-based management portal within the CloudGuard solution provides full visibility into security events at the endpoint, network and for cloud-email. Security Administrators can also customize policy configurations and monitoring – all using our simple cloud-based management portal.