How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We are using the Antivirus blade to protect our organization against threats such as viruses/malware that could propagate in our information system and harm it in various ways. Thanks to the important database maintained by Check Point that relies on this blade, we can enforce a strong security policy on our devices and be compliant with the latest best practices regarding internet threats. We operate several firewalls in our organization and we especially need this kind of efficiency on the internet-facing ones.
We primarily use the solution as an antivirus. We want to protect our systems from malware and viruses. We are still doing work from home and we are not sure how long this will last. Before Check Point Harmony software, we depended on Windows Defender Antivirus, but we realized that it was not so good. We wanted some good AV so that users who are working on a VPN would have an antivirus installed on their system. Also, we wanted a sandbox feature so that, if any machine got infected, we can automatically isolate it from the network.
We use this solution to protect our computers and remove all malicious software or code designed to damage our computers or data that belongs to our clients. We are notified of these actions. It is very important to protect all endpoints in our networks because these devices are entry points and every time, it is more difficult for our users to detect what object is malware and what object is legitimate software. Malware is evolving so rapidly that some estimate a new malware instance is created nearly every second.
The Antivirus Blade is one of the Blades we always buy for all of our Check Point firewalls to protect us against virus propagation into our infrastructure. Check Point has a huge database that protects us against viruses that is especially important for the internet-facing firewalls.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point Antivirus software blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of scanning files that are traversing the network for the presence of viruses or other malicious software.
We use this antivirus as part of our overall security solution. It handles the centralized investigation of internet content.
The main feature we use this product for is the firewall. The second thing we use it for is the secure VPN for connections to the corporate office. The third one is intrusion prevention and antivirus. It is an all-in-one solution for peace of mind. There is really a fourth feature. The appliance has at least four interfaces. This allows users to have a different interface port per user group. It is a way of making network segmentation. There are four ports on that appliance, but there can be six or seven.
What do you like most about Check Point Antivirus?
Thanks for sharing your thoughts with the community!