Ericom Shield

Ericom Shield

Ericom Software
SandBlast Threat Extraction

SandBlast Threat Extraction

Check Point Software Technologies
+
+

Related Products

  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Google Chrome Enterprise
    2,053 Ratings
    Visit Website
  • IPVanish
    111 Ratings
    Visit Website
  • Hotspot Shield
    121 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website

About

Ericom Software provides businesses with Zero Trust Secure Access to corporate applications, in the cloud and on-premises, from any device or location. Ericom Shield is a clientless enterprise-grade solution that is designed to address the needs of security and IT professionals while providing a transparent Internet experience for end users using Remote Browser Isolation. Ericom Shield can be deployed across organizations of any size, on all devices, using any operating system, or browser and does not require installation of any software or plug-ins on endpoints. Files to be downloaded are scanned and cleansed using a pre-integrated, Content Disarm and Reconstruction (CDR) process, before being released to the user device. When it comes to phishing attacks, user training just isn’t enough. Ericom Shield executes email-embedded URLs away from endpoints, in remote virtual browsers in the cloud or DMZ, so no malware can reach endpoints.

About

The SandBlast Threat Extraction technology is a capability of SandBlast Network and the Harmony Endpoint protection solutions. It removes exploitable content, reconstructs files to eliminate potential threats, and delivers sanitized content to users in a few seconds to maintain business flow. Reconstruct files with known safe elements in web-downloaded documents and emails. Immediate delivery of sanitized versions of potentially malicious files to maintain business flow. Access to original files after background analysis of attack attempts. SandBlast Network and Harmony Endpoint utilize Threat Extraction technology to eliminate threats and promptly deliver safe, sanitized content to its intended destination. Original files are accessible after undergoing background analysis by the Threat Emulation Engine. SandBlast Threat Extraction supports the most common document types used in organizations today.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a solution to manage and improve their operations

Audience

IT security teams that require a platform solution to remove exploitable content, and reconstruct files to eliminate potential threats

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Ericom Software
Founded: 1993
United States
www.ericom.com/solutions/browser-isolation/shield_datasheet.pdf

Company Information

Check Point Software Technologies
Founded: 1993
United States
www.checkpoint.com/products/threat-extraction/

Alternatives

BUFFERZONE

BUFFERZONE

Bufferzone Security

Alternatives

SandBlast Network

SandBlast Network

Check Point Software Technologies
FileWall

FileWall

Odix
Check Point Quantum Network Security

Check Point Quantum Network Security

Check Point Software Technologies
FortiIsolator

FortiIsolator

Fortinet

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Integrations

Adobe Document Cloud
Check Point CloudGuard
Microsoft 365
Microsoft Excel
Microsoft PowerPoint
Microsoft Word
SandBlast Network
Sasa Software GateScanner

Integrations

Adobe Document Cloud
Check Point CloudGuard
Microsoft 365
Microsoft Excel
Microsoft PowerPoint
Microsoft Word
SandBlast Network
Sasa Software GateScanner
Claim Ericom Shield and update features and information
Claim Ericom Shield and update features and information
Claim SandBlast Threat Extraction and update features and information
Claim SandBlast Threat Extraction and update features and information