Check Point secures major file-sharing services—Google Drive, ShareFile, OneDrive, Sharepoint, Box, Dropbox—from malware, ransomware, east-west attacks and prevents accidental or malicious data loss.
Through dynamic analysis in a scalable, cloud-based virtual environment, all attachments are tested and executed to ensure there is no malicious content. Check Point directly detects malicious behavior and quarantines files before the threat can spread. Custom policy filters allow for per-organization configurations.
Check Point uses cloud-native controls to enforce granular share policy by regulating collaboration rights for individual files or folders based upon its contents and context. Files are deleted, quarantined or encrypted before they become available to the wrong users.
Each file is scanned and analyzed by Check Point for malicious links which we then block across all of your file sharing apps. Every link in every file is measured on both a domain level as well as an individual page level, leveraging several major data sources for URL Block Lists.
-Bijender Mishra
Chief Information Security Officer,
Alkem Laboratories