?
Solved

Checkpoint Endpoint Managment

Posted on 2016-09-28
3
Medium Priority
?
128 Views
Last Modified: 2016-10-02
Anyone used CheckpointEndpoint Managment? How effective is their Application Control? Can it stop zero day Cryptos? Trying to find effective App Control Tool. Bit9 is out of budget.
0
Comment
Question by:mavrukin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 64

Accepted Solution

by:
btan earned 2000 total points
ID: 41821653
The management is not too bad. You can check that the baseline compliance for below in deployment of endpoints.

-appropriate endpoint security software
-correct OS service pack
-only approved applications run
-appropriate anti-malware product and version

You should be able to set users to Observe, Warn, or Restrict access to the network if they are not compliant with the policy. There is option to allows for automatic or user-based remediation (quarantined than access when corrected analogous to NAC health check, but not to be confuse with the 802.1x aurhentication check)

For the malware Prevention it also has the sandboxing and typical av signature checks, not the leading edge but still possible to give the minimum protection including against cryptoware like this case..not totally endpoint based though

http://blog.checkpoint.com/2016/02/22/check-point-threat-alert-locky-ransomware/

For appl control, if it is Windows can consider Applocker (Microsoft, with OS)  or Cryptoprevent (foolishIT) or SecureAPlus (SecureAge).
For malware and exploit blocks, if Windows can consider EMET (Microsoft, free download), or Malwarebytes anti-ransomware a& its anti-exploit (for oversight on browser exploit).
0
 
LVL 1

Author Comment

by:mavrukin
ID: 41825694
Thank you. I tested their solution, it's really glorified Kaspersky engine.
0
 
LVL 1

Author Comment

by:mavrukin
ID: 41825695
Than you
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Have you ever tried to find someone you know on Facebook and searched to find more than one result with the same picture? Perhaps someone you know has told you that they have a 'facebook stalker' or someone who is 'posing as them' online and ta…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question