Next Generation Threat Prevention Appliances

Next Generation Threat Prevention Appliances provide a unified solution that prevent advanced threats and malware attacks and enable your organization to easily and confidently control access to millions of web sites. Protections include stopping application-specific attacks, botnets, targeted attacks, APTs and zero-day threats.


Comprehensive threat protection from one appliance

  • Dedicated Threat Prevention Appliance
  • Multi-layered protection against cyber threats including technologies such as Threat Emulation, Threat Extraction, Antivirus, Anti-bot, IPS, App Control, URL Filtering and Identity Awareness
  • COMPLETE protection against advanced ZERO DAY threats via file inspection in ThreatCloud Emulation Service or to private cloud emulation device

Real-time security intelligence delivered from ThreatCloud

  • Leverage the industry's first collaborative network to fight cybercrime
  • Identify over 280 million addresses analyzed for bot discovery, over 12 Million malware signatures and 1 Million malicious websites
  • Dynamically update attack information from worldwide network of sensors and industry's best malware feeds
  • Combine information on remote operator hideouts, botnet communication patterns and attack behavior to accurately identify bot outbreaks
  • Receive up-to-the-minute bot intelligence from the ThreatCloud knowledgebase, including zero-day bot attacks discovered by Check Point Threat Emulation

Protection from malicious downloads and applications

  • Identify website delivering malware
  • Prevent malicious files from being downloaded
  • Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection
  • Enable specific applications while blocking risky or insecure applications

Maximize protection through unified management, monitoring and reporting

  • Integrated with Check Point Security Management
  • Monitor, analyze and report on risks and threats


Dedicated Threat Prevention Appliance

The solution combines Check Point software blades, security intelligence and management in one appliance to provide unified protection against threats attempting to enter your network. Market leading protection includes Threat Emulation, Threat Extraction, Firewall, Antivirus, Anti-Bot, URL Filtering, Application Control, Identity Awareness and more.

ThreatCloud™ Emulation Service

Check Point ThreatCloud™ Emulation Service prevents infections from undiscovered exploits zero-day and targeted attacks. This innovative solution quickly inspects files and runs them in a virtual sandbox to discover malicious behavior. Discovered malware is prevented from entering the network.


The Antivirus Software Blade stops incoming malicious files at the gateway before the user is affected with real-time virus signatures and anomaly-based protections from ThreatCloud™Identify over 4.5 million malware signatures and 300,000 malicious websites with a constantly-updated worldwide network of sensors that provide ongoing malware intelligence.


Intrusion Prevention System (IPS)

The IPS Software Blade delivers complete and proactive intrusion prevention—all with the deployment and management advantages of a unified and extensible next-generation firewall solution. Complementing Check Point’s firewall protection, IPS software blade further secures your network by inspecting packets traversing through the gateway It offers full-featured IPS with Geo-protections and is constantly updated with new defenses against emerging threats.


URL Filtering

The URL Filtering Software Blade controls access to millions of web sites by category, users, groups and machines with cloud-based technology that is constantly updated with new websites to support employee productivity and security policies. IT managers can block access to entire websites or just pages within, set enforcements by time allocation or bandwidth limitations, and maintain a list of accepted and unaccepted website URLs to fine tune security policies.

Logging and Status

Data is transformed into security intelligence with SmartLog, an advanced log analyzer that delivers split-second search results providing real-time visibility into billions of log records over multiple time periods and domains.

Add Functionality When You Need It

Additional functionality can be added to the Check Point Threat Prevention Appliance if your security needs increase. Seamlessly add software blades such as the Data Loss Prevention Software Blade.

Powered by ThreatCloud

The ThreatCloud™ feeds security gateway software blades with real-time security intelligence gathered with the first collaborative network to fight cyber-crime. Threats discovered by Check Point sensors, by Check Point Threat Emulation-enabled gateways, and reported in third-party feeds update Threat Cloud and are distributed to Check Point connected gateways.

Threat Extraction

Check Point Threat Extraction provides protection from infected documents by reconstructing files with known safe elements.  Exploitable content, including active content and various forms of embedded objects, are extracted out of the reconstructed file to eliminate any potential threats and provide zero malware documents in zero seconds.


The Anti-Bot Software Blade detects bot-infected machines, prevents bot damages by blocking bot cyber-criminal’s Command and Control center communications, and is continually updated from ThreatCloud™.

Application Control

The Application Control Software Blade controls access to over 5,200 applications and 240,000 social network widgets with the industry’s largest application coverage. It creates granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming, VoIP, games and more.

Identity Awareness

The Identity Awareness Software Blade provides granular visibility of users, groups and machines, enabling unmatched application and access control through the creation of accurate, identity-based policies.

Integrated Security Management

Unified security management simplifies the monumental task of managing growing threats, devices and users by enabling views, details and reports through a single pane of glass. Check Point’s comprehensive, centralized security management system controls all Check Point gateways and Software Blades from SmartDashboard. The intuitive graphical user interface enables IT managers to easily manage a wide set of security management functions.

Learn More


Check Point offers two easy to deploy Threat Prevention Software Packages to protect against today’s targeted attacks, APTs and zero-day threats.

Check Point Software BladesNext Generation Threat Extraction (NGTX) Software PackageNext Generation Threat Prevention (NGTP) Software Package
Threat Emulation (Sandboxing)X
Threat ExtractionX
Application ControlXX
URL FilteringXX
Anti-Spam and Email SecurityXX
Advanced Networking and ClusteringXX
Identity AwarenessXX
Mobile AccessXX
Network Policy ManagementXX
Logging and StatusXX

Our  Threat Prevention software packages are supported on  a range of Check Point Appliances. Please refer to the full list below.

AppliancesSupported for Next Generation Threat Extraction (NGTX) Software PackageSupported for Next Generation Threat Prevention (NGTP) Software Package