Solved

Checkpoint Endpoint Managment

Posted on 2016-09-28
3
114 Views
Last Modified: 2016-10-02
Anyone used CheckpointEndpoint Managment? How effective is their Application Control? Can it stop zero day Cryptos? Trying to find effective App Control Tool. Bit9 is out of budget.
0
Comment
Question by:mavrukin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 41821653
The management is not too bad. You can check that the baseline compliance for below in deployment of endpoints.

-appropriate endpoint security software
-correct OS service pack
-only approved applications run
-appropriate anti-malware product and version

You should be able to set users to Observe, Warn, or Restrict access to the network if they are not compliant with the policy. There is option to allows for automatic or user-based remediation (quarantined than access when corrected analogous to NAC health check, but not to be confuse with the 802.1x aurhentication check)

For the malware Prevention it also has the sandboxing and typical av signature checks, not the leading edge but still possible to give the minimum protection including against cryptoware like this case..not totally endpoint based though

http://blog.checkpoint.com/2016/02/22/check-point-threat-alert-locky-ransomware/

For appl control, if it is Windows can consider Applocker (Microsoft, with OS)  or Cryptoprevent (foolishIT) or SecureAPlus (SecureAge).
For malware and exploit blocks, if Windows can consider EMET (Microsoft, free download), or Malwarebytes anti-ransomware a& its anti-exploit (for oversight on browser exploit).
0
 
LVL 1

Author Comment

by:mavrukin
ID: 41825694
Thank you. I tested their solution, it's really glorified Kaspersky engine.
0
 
LVL 1

Author Comment

by:mavrukin
ID: 41825695
Than you
0

Featured Post

Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
An introduction to the wonderful sport of Scam Baiting.  Learn how to help fight scammers by beating them at their own game. This great pass time helps the world, while providing an endless source of entertainment. Enjoy!
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question