Security company Check Point Software Technologies Ltd introduced today Check Point Threat Extraction, a new security approach that proactively ensures documents are delivered to a network with zero malware in zero seconds.
According to last year's Check Point Security Report, a significant 84 percent of polled companies admitted to downloading an infected document in 2013. This finding highlights that documents pose one of the highest risks of infection for organisations.
As such, companies need to implement stronger defenses against these attacks. The only way to ensure complete protection is to preemptively remove threats by reconstructing documents with known safe elements. Active content, embedded objects and other exploitable content are simultaneously extracted, and the document is then reconstructed without potential threats to provide absolute safe content.
"Because the traditional approach of protecting against infected documents by looking for malware and blocking it does not provide absolute protection, organisations need a way to preemptively remove the threat of malware altogether," said Dorit Dor, vice president of products at Check Point Software Technologies. "With Check Point Threat Extraction, organisations can now defend their networks against threats with a radical new technology that delivers 100 percent safe documents immediately."
Sign up for CIO Asia eNewsletters.