Unified next generation solution that prevents advanced threats and malware attacks and enables an organization to easily and confidently control access to millions of web sites. Protections include stopping application-specific attacks, botnets, targeted attacks, APTs, and zero-day threats.

Benefits

Comprehensive threat protection from one appliance
  • Dedicated Threat Prevention Appliance
  • Includes multiple threat prevention technologies such as Antivirus, Anti-bot, IPS, App Control, URL Filtering, Identity Awareness and more
  • Inspect files and send to ThreatCloud Emulation Service or to private cloud emulation device
Real-time security intelligence delivered from ThreatCloud
  • Leverage the industry's first collaborative network to fight cybercrime
  • Identify over 280 million addresses analyzed for bot discovery, over 12 Million malware signatures and 1 Million malicious websites
  • Dynamically update attack information from worldwide network of sensors and industry's best malware feeds
  • Combine information on remote operator hideouts, botnet communication patterns and attack behavior to accurately identify bot outbreaks
  • Receive up-to-the-minute bot intelligence from the ThreatCloud knowledgebase, inlcuding zero-day bot attacks discovered by Check Point Threat Emulation
Protection from malicious downloads and applications
  • Identify website delivering malware
  • Prevent malicious files from being downloaded
  • Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection
  • Enable specific applications while blocking risky or insecure applications
Maximize protection through unified management, monitoring and reporting
  • Integrated with Check Point Security Management
  • Monitor, analyze and report on risks and threats

Features

A dedicated appliance focused on preventing threats attempting to enter your network. The Threat Prevention Appliance integrates market leading protection such as Firewall, Antivirus, Anti-Bot, URL Filtering, Application Control, Identity Awareness and more into one convenient appliance.

The ThreatCloud™ feeds security gateway software blades with real-time security intelligence gathered with the first collaborative network to fight cyber-crime. Threats discovered by Check Point sensors, by Check Point Threat Emulation-enabled gateways, and reported in third-party feeds update Threat Cloud and are distributed to Check Point connected gateways.

Stop incoming malicious files at the gateway before the user is affected with real-time virus signatures and anomaly-based protections from ThreatCloud™, the first collaborative network to fight cyber-crime. Identify over 4.5 million malware signatures and 300,000 malicious websites with a constantly-updated worldwide network of sensors that provide ongoing malware intelligence.

Virus Incident

Detects bot-infected machines, prevents bot damages by blocking bot cyber-criminal’s Command and Control center communications, and is continually updated from ThreatCloud™.

The IPS Software Blade delivers complete and proactive intrusion prevention—all with the deployment and management advantages of a unified and extensible next-generation firewall solution. Complementing Check Point’s firewall protection, IPS software blade further secures your network by inspecting packets traversing through the gateway It offers full-featured IPS with Geo-protections and is constantly updated with new defenses against emerging threats.
SmartDashboard - IPS

Control access to over 5,200 applications and 240,000 social network widgets with the industry’s largest application coverage. Create granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming, VoIP, games and more. Enables companies the ability to balance security and business needs.

Control access to millions of web sites by category, users, groups and machines with cloud-based technology that is constantly updated with new websites to support employee productivity and security policy. Block access to entire websites or just pages within, and set enforcements by time allocation or bandwidth limitations. Maintain a list of accepted and unaccepted website URLs to fine tune security policies.

Provides granular visibility of users, groups and machines, enabling unmatched application and access control through the creation of accurate, identity-based policies.

Transforms data into security intelligence with SmartLog, an advanced log analyzer that delivers split-second search results providing real-time visibility into billions of log records over multiple time periods and domains.

Unified security management simplifies the monumental task of managing growing threats, devices and users by enabling views, details, and reports through a single pane of glass. Check Point’s comprehensive, centralized security management system controls all Check Point gateways and Software Blades from SmartDashboard. The intuitive graphical user interface enables IT managers to easily manage a wide set of security management functions.

Check Point Threat Prevention Appliance can add additional software functionality if your security needs increase. Seamlessly add software blades such as the Data Loss Prevention Software Blade.

Specifications

Appliances
Enclosure
Max 1 GbE
Max 10 GbE
FONIC
SecurityPower
1 With Security Acceleration Module                               
1120 NGTPDesktop100No28
1140 NGTPDesktop100No34
1180 NGTPDesktop100No37
2200 NGTPDesktop60No121
4200 NGTP1U80Yes121
4400 NGTP1U120Yes230
4600 NGTP1U120Yes405
4800 NGTP1U162Yes673
12200 NGTP1U164Yes811
12400 NGTP2U2612Yes1185
12600 NGTP2U2612Yes2050
13500 NGTP2U2612Yes3200
13800 NGTP2U2612Yes3800
21400 NGTP2U3712No2175/2900 1
21600 NGTP2U3713No2788/3300 1
21700 NGTP2U3713No3300/3551 1
21800 NGTP2U3713No4100/4300 1