What is a Next Generation Firewall (NGFW)?

Next Generation Firewall (NGFW) is a security technology that provides protection against malware that protects you from threats you can’t see, with application-level inspection, malware intrusion prevention, and the ability to filter packets based on applications. Next Generation Firewalls have the ability to use signature-based IPS to make sure the applications you’re using are safe and not unwanted malware. NGFW are a step up from a traditional network firewall because they have the ability to identify and completely block malware before it enters your network.

What are the Benefits?

The benefits of NGFW are numerous, and include the ability to detect and control application usage to easily identify, allow, block or limit applications, and the features within those applications. You’ll be safe knowing that you’re protected against threats and malware, 24/7, while using the Internet.

Check Point Next Generation Firewall leverages the world’s largest application library, with more than 8,000 web 2.0 applications and creates granular policy definitions per user, device and group. Our NGFW integrates seamlessly with Microsoft AD, LDAP, RADIUS, Cisco pxGrid, Terminal Servers and 3rd parties via a Web API, and supports advanced identity awareness for stress-free policy enforcement. This Next Generation Firewall comes equipped with extra threat protection to help enforce consistent policy for local and remote users on Windows, macOS, Linux, Android and Apple iOS platforms.

Protect Yourself and Your Network

  • Rely on 24/7 advanced protection
  • Enjoy the added benefits of application control and intrusion protection (IPS) and additional security capabilities
  • Get greater understanding into security events with integrated, easy-to-use centralized management

Identity Awareness

Great security involves limiting and tracking access to sensitive data and resources and with Check Point Identity Awareness, your administrators get detailed visibility into the users, groups, applications, machines and connection types on your network so they can assign permissions to the right users and devices. The firewall makes it easy and cost-effective to enforce security policies, giving granular permission control over these entities, resulting in superior protection across the entire security gateway.

Seamless integrations with leading Identity and Access Management (IAM) vendors, such as Microsoft Active Directory provides complete user identification, enabling simple, application-based policy definition per user, device or group directly from the firewall. User identification may be acquired via:

  • Integrations with IAM vendors or a Web API
  • Through a captive portal
  • Installing a one-time, thin client-side agent

Application Control

Employees are using more apps than ever, and you’re on the hook to protect their networks, regardless of what apps they use. Check Point Next Generation Firewall has the industry’s largest application coverage, with more than 8,000 applications and 260,000 social network widgets included. With Check Point Application Control, you can create granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming, VoIP, games and more.

Logging and Status

To help make sense out of your security event data, we have included access to Check Point SmartEvent. SmartEvent is event management with a single view that provides full threat visibility into potential and real-time security risks. Take back network control through forensic and event investigation, compliance and reporting. Respond to security incidents immediately and gain true insight into your network.

Integrated Security Management

Our centralized security management simplifies the monumental task of managing your security environment. You’ll see and control threats, devices and users with a highly intuitive graphical interface providing views, details and reports on your security health. Manage all of your Check Point gateways and software blades from one comprehensive, centralized security dashboard.

Intrusion Prevention

Next Generation Firewall includes Check Point IPS, which secures your network by inspecting packets traveling through the gateway. It is a full-featured IPS, providing geo-protections and frequent, automated threat definition updates. Because the IPS is part of the integrated Software Blade Architecture, you’ll get all the deployment and management advantages of a unified and extensible solution.

R80 Cyber Security: Gateways & Management

Check Point NGFW use R80 cyber security software. R80 features centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security.


This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO