SandBlast Threat ExtractionCheck Point Software Technologies
|
||||||
Related Products
|
||||||
About
ReconstructMe’s usage concept is similar to that of an ordinary video camera – simply move around the object to be modelled in 3D. Scanning with ReconstructMe scales from smaller objects such as human faces up to entire rooms and runs on commodity computer hardware. Read more about its features. Integrate ReconstructMe into your application using our powerful SDK. ReconstructMe’s usage concept is similar to that of an ordinary video camera – simply move around the object to be captured. However, instead of a video stream you get a complete 3d model in real-time. Read about our hardware requirements. Modelling with ReconstructMe scales from smaller objects such as human faces up to entire rooms. ReconstructMe is capable of capturing and processing the color information of the object being scanned, as long as the sensor provides the necessary color stream.
|
About
The SandBlast Threat Extraction technology is a capability of SandBlast Network and the Harmony Endpoint protection solutions. It removes exploitable content, reconstructs files to eliminate potential threats, and delivers sanitized content to users in a few seconds to maintain business flow. Reconstruct files with known safe elements in web-downloaded documents and emails. Immediate delivery of sanitized versions of potentially malicious files to maintain business flow. Access to original files after background analysis of attack attempts. SandBlast Network and Harmony Endpoint utilize Threat Extraction technology to eliminate threats and promptly deliver safe, sanitized content to its intended destination. Original files are accessible after undergoing background analysis by the Threat Emulation Engine. SandBlast Threat Extraction supports the most common document types used in organizations today.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Anyone searching for a 3D real-time scanning system
|
Audience
IT security teams that require a platform solution to remove exploitable content, and reconstruct files to eliminate potential threats
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$279 one-time payment
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationReconstructMe
Founded: 1975
Austria
www.reconstructme.net
|
Company InformationCheck Point Software Technologies
Founded: 1993
United States
www.checkpoint.com/products/threat-extraction/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Integrations
Adobe Document Cloud
Check Point CloudGuard
Microsoft 365
Microsoft Excel
Microsoft PowerPoint
Microsoft Word
SandBlast Network
|
Integrations
Adobe Document Cloud
Check Point CloudGuard
Microsoft 365
Microsoft Excel
Microsoft PowerPoint
Microsoft Word
SandBlast Network
|
|||||
|
|
|