YOU DESERVE THE BEST SECURITY
  •  Within US    1-866-488-6691
  •  Outside US +44 1253 335558

CheckMe Instant Security Check

Are You Vulnerable to New Types of Attacks?

CheckMe by Check Point is a proactive assessment that identifies security risks on your network, endpoint, cloud and mobile environments. Based on this assessment, CheckMe instantly provides you with a detailed report that shows if your environments are vulnerable to ransomware, zero day threats, malware infections, browser exploit, data leakage and more.

CheckMe Threat Sequence CheckMe Threat Sequence
Perimeter and Datacenter
Protection
NGTX GATEWAYS
Endpoint and Browsers
Protection
HARMONY ENDPOINT
Cloud Applications
Protection
CLOUDGUARD APPSEC
 Mobile Device
Protection
HARMONY MOBILE

How does CheckMe work?

  1. Click on checkme.checkpoint.com
  2. Select which environments you would like to assess (Network, Endpoint, Cloud)
  3. CheckMe runs independently analyzing your environments
  4. Click on "Get full Report" to receive a summary report with results and remediation guidelines

Notes:
* The Cloud assessment requires available infrastructure and its credentials. Also, a cost of an hour will apply.
* The Mobile assessment requires a downloading of application into your Android device.

What threats are checked?

CheckMe simulates scenarios that could be a starting point for the following attack vectors:

Ransomware iconRansomware is a malware that encrypts users' files and require ransom for their decryption.

Command & Control Communication iconCommand & Control Communication let attackers take complete control over an infected computer.

Identity Theft iconIdentity Theft attack captures personal information by fake websites that appears to be legitimate.

Zero Day Attacks iconZero day attacks use the surprise element to exploit holes in the software that are unknown to the vendor.

Malware Infection iconMalware Infection lets attackers take complete control over an infected computer.

Browser Exploit iconBrowser Exploit is an attack that takes advantage of a particular vulnerability in a computing system.

Anonymous surfing iconAnonymous surfing can open backdoors into an organization's network.

Data Leakage iconData leakage unintentional or theft release of sensitive information outside the organization's network.

Cloud Segmentation iconCloud Segmentation scans for open ports of accessible machines within the same environment to indicate for access.

Place your form here
*Notice: By clicking submit you agree that the information you provide will be processed in accordance with Check Point's privacy policy.
This website uses cookies to ensure you get the best experience. Got it, Thanks!MORE INFO