Fast files convertion into the safe types
What do you like best?
1. The solution works with both interned-downloaded documents and email attchments.
2. The processing time is really short, especially in comparison with the threat emulation solutions.
3. The original files (before the processing) are stored for the configured time in case the access for them is needed.
What do you dislike?
I hope that the range of the file types supported would be increased by Check Point.
What problems are you solving with the product? What benefits have you realized?
It think that the implementation of the SandBlast Threat Extraction software blade by Check Point has improved the security protection level of our company. Before implementing the Check Point solutions, we relied on the Cisco ACLs and Zone-Based firewalls configured on the switches and routers accross the infrastructure. Nowadays this approach appears to be not an efficient solution for protecting from the advanced threats. The Check Point SandBlast Threat Extraction software blade works really fast by just converting the suspicious files destined to the users to the "clean" files of the PDF format by deleting all the potentially dangerous parts of the initial files, like Macroses, JavaScript Actions etc. All the info and file structures are preserved, so the end users can work with the files without any downsides.