The Check Point URL Filtering Software Blade provides optimized web security through full integration in the gateway to prevent bypass through external proxies. Integration of policy enforcement with Application Control means enhanced Web and Web 2.0 protection, and UserCheck technology empowers and educates users on web usage policy in real time. The URL Filtering Software Blade is a key component of the Secure Web Gateway.

Benefits

Protect users with cloud-based categorization and UserCheck technology
  • Dynamic cloud-based database of over 200,000,000 Websites
  • Real time updates of ever evolving and new URLs
  • Leverage UserCheck to empower users with real time alerts while educating on web policy
Unified Security over all aspects of the web with full Application Control integration
  • Allow unified enforcement and management across all aspects of web security
  • Define, enforce and report on web and application security policies at the user and group levels
  • Control over 200 Million websites, 4,800 Web 2.0 applications, and 300,000 widgets to achieve the comprehensive web security
  • Enforce bandwidth and/or time limits to select websites or Web 2.0 applications
Optimize web security and reduce Total Cost of Ownership
  • Full integration of URL Filtering into Check Point gateways eliminates bypass through external proxies and enforces inspection of all traffic--even when traversing non-standard ports
  • Option to scan and secure SSL encrypted traffic passing through the gateway or chose "Lite" HTTPS filtering without SSL inspection
  • Easy one click activation leveraging the Software Blade Architecture or a part of the Check Point Secure Web Gateway appliance
  • Up to 90% reduction of TCO compared to traditional point solution

Features

Utilize a dynamically updated database of over 200 Million Websites to allow, block or limit web site access in real-time—all web site traffic, clear and SSL-encrypted. Choose from 64 pre-defined content categories.

  • Dynamically allow, block or limit access to over 200 million Websites
  • Analyze SSL-encrypted traffic
  • Create policy rules using 64 pre-configured categories
  • Control access to complete sites or just pages within a site
  • Fine tune policies with white listing and black listing specific URLs

Combine the URL Filtering Software Blade and the Application Control Software Blade to unify web site access control with web application and widget control for improved security and lower cost.

The Check Point URL Filtering Software Blade provides the ability to allow, block or limit access (based on time and/or bandwidth) to millions of web sites and web pages. Check Point Application Control Software Blades provides similar capabilities for 4,800 internet applications and over 300,000 web-based widgets.

Check Point unifies URL Filtering and Application Control deliver:

  • One common rule-base to simplify policy creation with joint categories for both websites and applications
  • One management console for easier management
  • One reporting system for improved visibility into web events.

    Combining URL Filtering and Application Control Rules

Scan and secure SSL encrypted traffic passing through the gateway.

When traffic is passing through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver.

Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy. Some encrypted content passing through the gateway should not be inspected, and therefore can be bypassed with a simple administrator policy definition.

You can opt for “Lite” HTTPS filtering and filter HTTPS traffic without SSL inspection.

Use Check Point UserCheck to actively engage and educate users as they access the web to identity potential policy incidents as they occur and remediate them immediately.

Users are an integral part of the web security and control process. The best practice is to engage and educate users as they use the web to identity potential policy incidents as they occur and remediate them immediately. Check Point UserCheck, a feature of the URL Filtering software blade, enables an organization to implement this best practice saving valuable IT administration time while improving user productivity and overall security.

Engage and Educate Web Users with UserCheck

Allow, block or limit web site access based on user, group and machine-id for a single URL or an entire URL Category.


The ability to allow, block and limit web site access based on user, group and even machine-id is missing from most URL filtering solutions today. Check Point URL Filtering is user-aware making user, group and machine-id information readily available for policies, reporting and management purposes.

User Awareness in URL Filtering Events

Achieve an unmatched level of visibility into web related security events to not only detect web access security events, but also prevent them.

Having sufficent visibility into web access security events and user behavior is an essential part of ensuring an organization’s security. It helps to detect potentially malicious incidents and prevent them from happening. Have full visibility into trends, statistics, maps and events. Get reporting that is intuitive and insightful with such features as detailed user activity and browse time details.

Check Point URL Filtering seamlessly integrates with SmartEvent Software Blade to provide an unmatched level of visibility into web related security events. This enables Check Point to prevent web access related security events rather than just detecting them or simply missing them.

Consolidated URL Filtering and Application Control Events

The URL Filtering Software Blade is integrated into the Software Blade Architecture, and can be activated easily on Check Point security Gateways. By just enabling the URL Filtering software blade inside their existing gateways, companies can save up to 90% over traditional stand-alone URL Filtering solutions.

URL Filtering is fully integrated into Check Point gateways

  • Eliminates bypass through external proxies
  • Enforces inspection of all traffic
  • Protects when traversing non-standard ports
  • Improves TCO by managing and maintaining security on one machine
It is also an integral part of Check Point Securie Web Gateway Appliance — a dedicated gateway to secure Web 2.0.
  • Scales up to 7 Gbps throughput
  • Achieve up to 500,000 concurrent sessions
  • High availability clustering

Specifications

Supported Appliance Families
  • Check Point 2000, 4000, 12000, 21000 and 61000 Appliances
  • Check Point Secure Web Gateway Appliance
  • Check Point Threat Prevention Appliance
  • Check Point Power-1
  • Check Point IP Appliances
  • Check Point UTM-1
  • Check Point IAS
Supported Operating Systems
  • GAiA
  • SecurePlatform
  • IPSO 6.2 Disk-based
  • IPSO 6.2 Flash-based
  • Windows