Blocks access to malware infested websites and usage of high risk applications
Prevents malware infections and post-infection damage with multi-layered security
Enhances operational efficiency with expertise and best-of-breed security management
Our previous device was basically just a firewall. With Check Point Secure Web Gateway, we can take advantage of all kinds of filtering for all layers. Using the different software blades, the protection is virtually unlimited. And our clustered environment gives us complete business continuity, so the network is never down.
Director of IT
Hotel Nikko San Francisco
Traditional internet security requires establishing policies for each element of securing the web. Check Point’s Web Security Gateway Appliance is the only solution to offer unified control over all websites, web applications, users and machines. This significantly reduces the complexity of securing the internet and enables organizations to more easily and cost-effectively implement and enforce corporate security policies.
Stop incoming malicious files at the gateway before the user is infected with real-time virus signatures and anomaly-based protections from ThreatCloud, the first collaborative network to fight cybercrime. Identify over 9 million signatures and 900,000 malicious websites with a constantly updated world-wide network of sensors that provide ongoing malware intelligence.
Control access to over 4,800 applications and 240,000 social network widgets with the industry’s largest application coverage. Create granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming, VoIP, games and more. Enable business while ensuring security.
Extend your Secure Web Gateway to identify infected hosts and prevent bot damage. Detect infected hosts, accurately identify bot outbreaks, block bot communication between infected hosts and remote operator, and receive up-to-the minute bot intelligence from the ThreatCloud knowledge base.
Engage and educate users about corporate policy and internet safety without involving IT personnel with a real-time pop-up agent that offers users advice and the opportunity to reconsider current online activities. Engaging users in the decision-making process increases awareness which can help organizations mitigate the security risks associated with enterprise internet use.
Quickly stop critical security events and add on-the-fly protections with our unified security event management. SmartEvent correlates all the activity from your Check Point products and 3rd party devices and provides a security timeline including trends, statistics and maps for a detailed snapshot of your security status. Leverage offline reporting and numerous pre-defined security events plus an event-wizard to customize your own events. Schedule and email offline reports, in PDF, HTML or excel format, of top used applications and accessed sites, detailed user Web activity and more.
Control access to millions of web sites by category, users, groups and machines with cloud-based technology that is constantly updated with new websites to support employee productivity and security policy. Block access to entire websites or just pages within, and set enforcements by time allocation or bandwidth limitations. Maintain a list of accepted and unaccepted website URLs to fine tune security policies.
Real-time protection information delivered to the Secure Web Gateway. Dynamically updated, using a worldwide network of threat sensors, this is the first real time collaborative network to effectively fight cybercrime.
NSS Labs top-rated IPS Software Blade delivers complete and proactive intrusion prevention. Ranked #1 in Microsoft and Adobe threat coverage 3 years in a row, it secures your network by timely and effectively preventing browser and application vulnerability exploits.
Scan and secure SSL encrypted traffic passing through the gateway. When traffic is passing through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver. Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy. Some encrypted content passing through the gateway should not be inspected, and therefore can be bypassed with a simple administrator policy definition.
Unified security management simplifies the monumental task of managing growing threats, devices and users. Our comprehensive, centralized security management system controls all Check Point gateways and Software Blades from SmartDashboard. The intuitive graphical user interface enables IT managers to easily manage a wide set of security management functions.
Check Point Secure Web Gateway has flexible deployment options to support a multitude of business needs and sizes including inline installation as well as the option to set your gateway to act as a proxy.
|Appliances||Enclosure||Max 1 GbE||Max 10 GbE||FONIC||SecurityPower|
|21400 NGSWG||2U||37||12||No||2175/2900 1|
|21600 NGSWG||2U||37||13||No||2788/3300 1|
|21700 NGSWG||2U||37||13||No||3300/3551 1|
|21800 NGSWG||2U||37||13||No||4100/4300 1|
|1 With Security Acceleration Module|