Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Checkpoint Endpoint Managment

Posted on 2016-09-28
3
84 Views
Last Modified: 2016-10-02
Anyone used CheckpointEndpoint Managment? How effective is their Application Control? Can it stop zero day Cryptos? Trying to find effective App Control Tool. Bit9 is out of budget.
0
Comment
Question by:mavrukin
  • 2
3 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 41821653
The management is not too bad. You can check that the baseline compliance for below in deployment of endpoints.

-appropriate endpoint security software
-correct OS service pack
-only approved applications run
-appropriate anti-malware product and version

You should be able to set users to Observe, Warn, or Restrict access to the network if they are not compliant with the policy. There is option to allows for automatic or user-based remediation (quarantined than access when corrected analogous to NAC health check, but not to be confuse with the 802.1x aurhentication check)

For the malware Prevention it also has the sandboxing and typical av signature checks, not the leading edge but still possible to give the minimum protection including against cryptoware like this case..not totally endpoint based though

http://blog.checkpoint.com/2016/02/22/check-point-threat-alert-locky-ransomware/

For appl control, if it is Windows can consider Applocker (Microsoft, with OS)  or Cryptoprevent (foolishIT) or SecureAPlus (SecureAge).
For malware and exploit blocks, if Windows can consider EMET (Microsoft, free download), or Malwarebytes anti-ransomware a& its anti-exploit (for oversight on browser exploit).
0
 
LVL 1

Author Comment

by:mavrukin
ID: 41825694
Thank you. I tested their solution, it's really glorified Kaspersky engine.
0
 
LVL 1

Author Comment

by:mavrukin
ID: 41825695
Than you
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows 10 4 71
Full list of ransomwares to date 6 135
What to look for in Fraud Protection Solutions  PoC 1 72
What is Ransomware? 16 87
OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
PREFACE The purpose of this guide is to provide information to successfully add specific IIS 7.0 role services for the Symantec Endpoint Protection Manager (SEPM) to function properly when installed on Windows 2008. AUDIENCE Information Technol…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question