Threat Emulation prevents infections from undiscovered exploits, zero-day and targeted attacks. This innovative solution quickly inspects incoming files, launches suspicious files in a virtual sandbox, discovers malicious behavior and then prevents discovered malware from entering the network. The Emulation appliance is an on-premise solution to emulate threats.
Key Features:
Identify new attacks hidden in Adobe PDF, Microsoft Office, Java, Flash, and executable files.
Emulate files and documents for threats in a secure sandbox.
Protection against attacks targeting multiple Windows operating system environments.
Emulate files within SSL and TLS communications.
Prevent malicious files from entering the organization.
Includes the Threat Emulation, Threat Extraction, Anti-Virus and Anti-Bot software blades, providing comprehensive protection from advanced threats.
Deploy inline or as a private cloud. In private cloud mode, the appliance provides an emulation service for all security gateways across the organization?s network.
In the TE250X appliance, a second Power Supply Unit is optional. When a second PSU is not installed, Gaia OS reports it as "Value=Down" and "Status=Off". This is different from similar appliances (e.g., 4800), where a filler is closing a circuit, thus behaving as if a PSU is installed.
Note - Officially supported 3rd party integrations with Check Point Threat Emulation Appliances use only ICAP and API. Any other 3rd party integration might have technical limitations that can negatively affect the deployment. Contact Check Point Solution Center (through the local Check Point office) to evaluate possible limitations in your specific environment.