CheckMe by Check Point is a proactive assessment that identifies security risks on your network. Based on this assessment, CheckMe instantly provides you with a detailed report that shows if your computer and network are vulnerable to ransomware, identity theft, zero day threats, bot communications, browser attack, anonymizer use and data leakage.

CheckMe Threat Sequence CheckMe Threat Sequence


How does CheckMe work?

  1. Click on
  2. CheckMe runs independently analyzing your network's security controls
  3. Click on “Get full Report” to receive a summary report with results and remediation guidelines

What threats are checked?

CheckMe simulates scenarios that could be a starting point for the following attack vectors:

Ransomware iconRansomware is malware that encrypts users’ files and requires the purchase of a key to decrypt the encrypted files.

Phishing Attacks iconPhishing attacks use fake websites that appear to be legitimate, but actually capture personal information such as usernames, passwords and credit card numbers.

Zero Day Attacks iconZero day attacks use new and unknown exploits to bypass traditional security that relies upon signatures of known threats.

Botnet iconBots perform malicious tasks allowing an attacker to take complete control over an infected computer and control it from remote Command & Control servers

Browser Attacks iconBrowser attacks inject malicious script into websites to steal cookies from victims for the purpose of impersonating the victims.

Anonymizer Usage iconAnonymized surfing demonstrates that users can hide their online activity and may open a back door into your network.

Data Leakage iconData leakage is the result of users transferring classified or sensitive information outside of the corporate network, either on purpose or by mistake