Check Point Threat Emulation and Threat Extraction Product Details
Threat Emulation will analyze your original file in a sandbox environment and provide a downloadable report that includes file details and information about potentially malicious behavior.
Threat Extraction will remove any exploitable elements, such as macros and embedded objects, and return a safe, reconstructed file.
Category: Online & appliance based services - anti-virus, intrusion detection, antispam, advanced threat detection
Product Type: Subscription license - 2 years
License Type: 1 license
Additional Resources: Product Manuals
Manufactured by: Check Point Software
Mfg Part No: CPSB-TETX-12400-2Y
Shipping Weight: 0.0100 pound(s)
Click here for full warranty and support information
- Check Point Software logos are registered trademarks of Check Point Software. All others trademarks and copyrights mentioned herein are the property of their respective owners.