Check Point Next Generation Firewall provides customers of all sizes with the latest data and network security protection in an integrated next generation firewall platform, reducing complexity and lowering the total cost of ownership. Whether you need next generation security for your data center, enterprise, small business or home office, Check Point has a solution for you. Check Point’s data center security solutions provide a comprehensive security architecture with flexible enforcement points for advanced protection against the latest cyberattacks. Enterprises deploy security along well—defined boundaries at the perimeter and internally within software defined data centers. Check Point has next generation firewall solutions for protecting both north—south and east—west traffic. Check Point has an affordable, easy to use and effective solution to secure small businesses. This includes turn—key appliances and a cloud—based Managed Security Service option, giving you the freedom to focus on growing your business.
Check Point vSEC products protect assets in the cloud from the most sophisticated threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks. Process efficiencies and increased network agility are driving IaaS and SDN technology adoption at a rapid pace. But this new infrastructure is also presenting businesses with a unique set of security challenges. Check Point vSEC protects assets in the cloud from the most sophisticated threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks, ensuring you can embrace the cloud with confidence. Network virtualization has created a shift in traffic behavior. Now, more and more traffic is going East—West in the data center creating new security challenges. With few controls to secure this east-west traffic, threats can travel unimpeded once inside the data center. Check Point vSEC seamlessly delivers advanced threat protections to prevent the lateral spread of threats within Software—Defined Data Centers.
Data Center Security
Protecting today’s data center networks requires greater flexibility and innovation to keep pace with increasingly sophisticated threats. Check Point Next Generation Firewall data center security solutions provide a comprehensive security architecture with flexible enforcement points for advanced protection against the latest cyberattacks. Today’s cybercriminals are persistent, well—organized and technically proficient. They target data centers with alarming frequency because they know this provides the greatest ROI for their efforts. At the same time, the increased use of virtualization technologies and cloud—based services introduces a host of new security challenges. Enterprises today must safeguard confidential data and infrastructure while allowing greater agility to easily adapt to new business trends and needs. Check Point Next Generation Firewall data center appliances combine high—performance, multi—core capabilities with fast networking technologies to provide the highest level of security.
Public Cloud Security
Process efficiencies and increased network agility are driving IaaS and SDN technology adoption at a rapid pace. But this new infrastructure is also presenting businesses with a unique set of security challenges. Check Point vSEC protects assets in the cloud from the most sophisticated threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks, ensuring you can embrace the cloud with confidence. Moving computing resources and data to public clouds means security responsibilities become shared between you and your cloud provider. While infrastructure protection is delivered by the provider, businesses want the ability to control their own data and keep it private as well as protect cloud assets, all while maintaining compliance with regulatory mandates. Check Point vSEC enables reliable connectivity to public cloud assets while protecting applications and data with advanced threat prevention across public and hybrid cloud environments.
Check Point Next Generation Firewall
The enhanced Check Point Antivirus Software Blade uses real—time virus signatures and anomaly based protections from ThreatCloud, the first collaborative network to fight cybercrime, to detect and block malware at the gateway before users are affected. ThreatCloud is a collaborative network and cloud—driven knowledge base that delivers real—time dynamic security intelligence to security gateways. That intelligence is used to identify emerging outbreaks and threat trends.
ThreatCloud powers the Antivirus Software Blade allowing gateways to investigate always—changing malware signatures. Since processing is done in the cloud, millions of signatures and malware protection can be scanned in real—time. ThreatCloud’s knowledgebase is dynamically updated using attack information from worldwide gateways, feeds from a network of global threat sensors, Check Point research labs and the industry’s best malware feeds. Correlated security threat information is then shared among all gateways collectively.
Using smartphones and tablets to access critical business information on the go has many benefits, but can expose your sensitive data to risk. Check Point’s SandBlast Mobile protects your devices from advanced mobile threats, ensuring you can deploy and defend devices with confidence. Check Point SandBlast Mobile is the industry’s only unified, cross—platform solution to protect enterprises from mobile breaches. An extension of Check Point’s SandBlast family of products, SandBlast mobile detects and blocks attacks before they become widespread.
Only Check Point provides a complete mobile security solution that protects devices from threats on the device (OS), in apps, and in the network, and delivers the industry’s highest threat catch rate for iOS and Android. Check Point SandBlast Mobile uses malicious app detection to find known and unknown threats by applying threat emulation, advanced static code analysis, app reputation and machine learning.
As part of the Check Point SandBlast Zero—Day Protection solution, Threat Emulation prevents infections from new malware and targeted attacks. This innovative zero—day threat sandboxing capability within the SandBlast solution delivers the best possible catch rate for threats, and is virtually immune to attackers’ evasion techniques. Highest catch rate to protect your organization from unknown malware, zero—day and targeted attacks. Detect and block new, unknown malware and targeted attacks found in email attachments, downloaded files, and URLs to files within emails.
Provide protection across one of the widest range of file types including, Microsoft Office, Adobe PDF, Java, Flash, executables, and archives, as well as multiple Microsoft Windows OS environments. Uncover threats hidden in SSL and TLS encrypted communications. Stop hackers from evading detection and infiltrating your network, reducing risk of expensive breaches. Identify even the most dangerous attacks in their infancy using unique CPU—level inspection.
The Next Generation Threat Prevention software bundles provide organizations of all sizes — from small, midsize and large enterprises with comprehensive protection against known and unknown threats using two simple packages: Next Generation Threat Extraction (NGTX) and Next Generation Threat Prevention (NGTP). Comprehensive threat protection is available in two simple packages for Check Point appliances. Next—Generation Threat Extraction (NGTX): Includes multi—layered protection from known threats AND zero—day attacks using SandBlast Threat Emulation, SandBlast Threat Extraction, Antivirus, Anti—bot, IPS, App Control, URL Filtering and Identity Awareness.
Next—Generation Threat Prevention (NGTP): Includes multi—layered protection from known, signature—based threats including Antivirus, Anti—Bot, IPS, App Control, URL Filtering and Identity Awareness. Supported on small, midsize and large—scale data center appliances, the NGTX and NGTP software bundles provide advanced threat protection against known threats, zero—day malware and even the most sophisticated attacks.
The Check Point URL Filtering Software Blade provides optimized web security through full integration in the gateway to prevent bypass through external proxies. Integration of policy enforcement with Application Control means enhanced Web and Web 2.0 protection, and UserCheck technology empowers and educates users on web usage policy in real—time. The URL Filtering Software Blade is a key component of the Secure Web Gateway.
Utilize a dynamically updated database of over 200 Million Websites to allow, block or limit website access in real—time — all web site traffic, clear and SSL—encrypted. Choose from 64 pre—defined content categories. Scan and secure SSL encrypted traffic passing through the gateway. When traffic is passing through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re—encrypts, sending the newly encrypted content to the receiver. Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy.