Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?
A. Firewall
B. Application Control
C. Anti-spam and Email Security
D. Antivirus
Explanation: The enhanced Check Point Antivirus Software Blade uses real-time virus signatures and anomaly-based protections from ThreatCloud-„¢, the first collaborative network to fight cybercrime, to detect and block malware at the gateway before users are affected.
Reference: https://www.checkpoint.com/products/antivirus-software-blade/