- CheckMates
- :
- Products
- :
- Harmony
- :
- Endpoint
- :
- Re: Anti-Exploit x Threat Extraction
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Jump to solution
Anti-Exploit x Threat Extraction
Hi,all.
What is the difference between these 2 functionalities in Harmony Endpoint solution? Because, by definities, it souns very similar:
- Anti-Exploit protects against application threats that exploit memory vulnerabilities. It protects widely targeted applications such as Microsoft Office, Adobe PDF Reader, Browsers, and Adobe Flash.
- Threat Extraction proactively protects users from malicious content. It quickly delivers safe files while the original files are inspected for potential threats.
Regards.
Valter Junior
1 Solution
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The main difference is where they execute and when.
- Anti-Exploit runs as you are using your computer.
- Threat Extraction is executed as you download specific document types to your computer. A copy stripped of potentially malicious content is provided to the end user prior to emulation finishing to determine if the document is truly malicious or not.
2 Replies
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The main difference is where they execute and when.
- Anti-Exploit runs as you are using your computer.
- Threat Extraction is executed as you download specific document types to your computer. A copy stripped of potentially malicious content is provided to the end user prior to emulation finishing to determine if the document is truly malicious or not.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It's clear now! Thank you so much!
