Check Point Introduces Threat Extraction for Zero Malware in Zero Seconds
March 2015 by Marc Jacob
Check Point® Software Technologies Ltd. introduced Check Point Threat Extraction, a radical new security approach that proactively ensures documents are delivered to a network with zero malware in zero seconds.
Attacks are evolving and increasing every day, however documents still pose one of the highest risks of infection for organizations. According to the Check Point 2014 Security Report, 84% of companies downloaded an infected document in 2013. Companies need to implement stronger defenses against these attacks. The only way to ensure complete protection is to preemptively remove threats by reconstructing documents with known safe elements. Active content, embedded objects and other exploitable content are simultaneously extracted, and the document is then reconstructed without potential threats to provide 100% safe content. With Check Point Threat Extraction, organizations can protect themselves against both known and unknown threats.