This letter summarizes security features in Check Point products that help prevent malicious software. The products use specialized, purpose-built operating systems that make integrating third-party antivirus software unfeasible. However, the operating systems lack interfaces that viruses could use to infect the system. Additional security measures include firewall rules that block external connections, hardened appliances with unnecessary ports closed, stateful inspection of all traffic, and logging and auditing of administrator commands.