Solved

Checkpoint Endpoint Managment

Posted on 2016-09-28
3
45 Views
Last Modified: 2016-10-02
Anyone used CheckpointEndpoint Managment? How effective is their Application Control? Can it stop zero day Cryptos? Trying to find effective App Control Tool. Bit9 is out of budget.
0
Comment
Question by:mavrukin
  • 2
3 Comments
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
ID: 41821653
The management is not too bad. You can check that the baseline compliance for below in deployment of endpoints.

-appropriate endpoint security software
-correct OS service pack
-only approved applications run
-appropriate anti-malware product and version

You should be able to set users to Observe, Warn, or Restrict access to the network if they are not compliant with the policy. There is option to allows for automatic or user-based remediation (quarantined than access when corrected analogous to NAC health check, but not to be confuse with the 802.1x aurhentication check)

For the malware Prevention it also has the sandboxing and typical av signature checks, not the leading edge but still possible to give the minimum protection including against cryptoware like this case..not totally endpoint based though

http://blog.checkpoint.com/2016/02/22/check-point-threat-alert-locky-ransomware/

For appl control, if it is Windows can consider Applocker (Microsoft, with OS)  or Cryptoprevent (foolishIT) or SecureAPlus (SecureAge).
For malware and exploit blocks, if Windows can consider EMET (Microsoft, free download), or Malwarebytes anti-ransomware a& its anti-exploit (for oversight on browser exploit).
0
 
LVL 1

Author Comment

by:mavrukin
ID: 41825694
Thank you. I tested their solution, it's really glorified Kaspersky engine.
0
 
LVL 1

Author Comment

by:mavrukin
ID: 41825695
Than you
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

PREFACE The purpose of this guide is to explain how to manually move a SEP client to a different client group by performing steps on the client-side. These steps may prove particularly useful because they allow the client to move after it has alrea…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now