Next Generation Firewall (NGFW) is a security technology that provides protection against malware that protects you from threats you can’t see, with application-level inspection, malware intrusion prevention, and the ability to filter packets based on applications. Next Generation Firewalls have the ability to use signature-based IPS to make sure the applications you’re using are safe and not unwanted malware. NGFW are a step up from a traditional network firewall because they have the ability to identify and completely block malware before it enters your network.
The benefits of NGFW are numerous, and include the ability to detect and control application usage to easily identify, allow, block or limit applications, and the features within those applications. You’ll be safe knowing that you’re protected against threats and malware, 24/7, while using the Internet.
Check Point Next Generation Firewall leverages the world’s largest application library, with more than 8,000 web 2.0 applications and creates granular policy definitions per user, device and group. Our NGFW integrates seamlessly with Microsoft AD, LDAP, RADIUS, Cisco pxGrid, Terminal Servers and 3rd parties via a Web API, and supports advanced identity awareness for stress-free policy enforcement. This Next Generation Firewall comes equipped with extra threat protection to help enforce consistent policy for local and remote users on Windows, macOS, Linux, Android and Apple iOS platforms.
Great security involves limiting and tracking access to sensitive data and resources and with Check Point Identity Awareness, your administrators get detailed visibility into the users, groups, applications, machines and connection types on your network so they can assign permissions to the right users and devices. The firewall makes it easy and cost-effective to enforce security policies, giving granular permission control over these entities, resulting in superior protection across the entire security gateway.
Seamless integrations with leading Identity and Access Management (IAM) vendors, such as Microsoft Active Directory provides complete user identification, enabling simple, application-based policy definition per user, device or group directly from the firewall. User identification may be acquired via:
Employees are using more apps than ever, and you’re on the hook to protect their networks, regardless of what apps they use. Check Point Next Generation Firewall has the industry’s largest application coverage, with more than 8,000 applications and 260,000 social network widgets included. With Check Point Application Control, you can create granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming, VoIP, games and more.
To help make sense out of your security event data, we have included access to Check Point SmartEvent. SmartEvent is event management with a single view that provides full threat visibility into potential and real-time security risks. Take back network control through forensic and event investigation, compliance and reporting. Respond to security incidents immediately and gain true insight into your network.
Our centralized security management simplifies the monumental task of managing your security environment. You’ll see and control threats, devices and users with a highly intuitive graphical interface providing views, details and reports on your security health. Manage all of your Check Point gateways and software blades from one comprehensive, centralized security dashboard.
Next Generation Firewall includes Check Point IPS, which secures your network by inspecting packets traveling through the gateway. It is a full-featured IPS, providing geo-protections and frequent, automated threat definition updates. Because the IPS is part of the integrated Software Blade Architecture, you’ll get all the deployment and management advantages of a unified and extensible solution.
Check Point NGFW use R80 cyber security software. R80 features centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security.