Check Point Threat Extraction will protect important documents in your company from viruses
According to data published in Check Point 2014 Security Report, in 2013, 84% of companies downloaded infected documents and fell victim to computer viruses. Worrying is the fact that from year to year there is a growing risk of hacking attacks not only on companies but the government administration, the financial, energy and health sectors. It is estimated that a medium-sized company in Poland spends PLN 1.5 million annually on securing its network.
Companies need more effective protection against these attacks. Such is the solution of Check Point Threat Extraction, which consists in complete protection of company documents with a system that gives the possibility to reconstruct files without potentially harmful components, guaranteeing 100% security of the document so processed. The Check Point Threat Extraction solution secures the organization both by known and unknown threats.
Check Point Threat Extraction is a revolutionary new technology that allows you to ensure 100% network security by allowing only secure documents - explains Krzysztof Wójtowicz, general director of Check Point Software Technologies in Poland.
In the traditional approach, documents are scanned to detect and remove malicious code, which does not guarantee absolute security. This level of security can only be ensured by the preventive removal of potentially dangerous document elements.
Hackers are well aware of this and are increasingly taking advantage of the weaknesses of companies' information systems. Over the last year, the number of incidents that breach the IT security of companies around the world has increased by 48 percent. in Europe, including Poland - by about 41 percent. - according to the 2015 PwC report.
Every year, the world economy loses about USD 375-575 billion on cybercrime, which in terms of a company gives losses in the amount of approximately USD 3 million in 2014. This means that the costs incurred by companies around the world in connection with cyber attacks increased within last year by as much as 34%.
The Check Point Threat Extraction solution will be offered as part of the new Next Generation Threat Prevention package (NGTX), available from the second quarter of 2015 through the global Check Point network.
The only one hundred percent secure solution consists in preventively removing potential threats and reconstructing documents from trusted, secure elements. Active content, embedded objects and other elements of documents that can be used to carry out an effective attack are extracted from the document and then reconstructed without potentially harmful components, guaranteeing 100% security of the document so processed. The Check Point Threat Extraction solution secures the organization both by known and unknown threats.
Details about the solution can be found at: http://www.checkpoint.com/pro…
Learn more about our offer
We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.