Solved

Checkpoint Endpoint Managment

Posted on 2016-09-28
3
63 Views
Last Modified: 2016-10-02
Anyone used CheckpointEndpoint Managment? How effective is their Application Control? Can it stop zero day Cryptos? Trying to find effective App Control Tool. Bit9 is out of budget.
0
Comment
Question by:mavrukin
  • 2
3 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 41821653
The management is not too bad. You can check that the baseline compliance for below in deployment of endpoints.

-appropriate endpoint security software
-correct OS service pack
-only approved applications run
-appropriate anti-malware product and version

You should be able to set users to Observe, Warn, or Restrict access to the network if they are not compliant with the policy. There is option to allows for automatic or user-based remediation (quarantined than access when corrected analogous to NAC health check, but not to be confuse with the 802.1x aurhentication check)

For the malware Prevention it also has the sandboxing and typical av signature checks, not the leading edge but still possible to give the minimum protection including against cryptoware like this case..not totally endpoint based though

http://blog.checkpoint.com/2016/02/22/check-point-threat-alert-locky-ransomware/

For appl control, if it is Windows can consider Applocker (Microsoft, with OS)  or Cryptoprevent (foolishIT) or SecureAPlus (SecureAge).
For malware and exploit blocks, if Windows can consider EMET (Microsoft, free download), or Malwarebytes anti-ransomware a& its anti-exploit (for oversight on browser exploit).
0
 
LVL 1

Author Comment

by:mavrukin
ID: 41825694
Thank you. I tested their solution, it's really glorified Kaspersky engine.
0
 
LVL 1

Author Comment

by:mavrukin
ID: 41825695
Than you
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Run .exe file from network share 2 68
Forwarding web requests to different web servers 15 75
Norton antivirus 11 73
Restoring files from Windows Server Backup 7 80
OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now