The Next Generation Threat Prevention software bundles provide organizations of all sizes with comprehensive protection against known and unknown threats. Two simple packages are used: Next Generation Threat Prevention & SandBlast™ (NGTX) and Next Generation Threat Prevention (NGTP).
Comprehensive threat protection is available in two simple packages for Check Point appliances
Real-time security intelligence delivered from ThreatCloud
Protection from malicious downloads and applications
Maximize protection through unified management, monitoring and reporting
Supported on small, midsize and large-scale data center appliances, the NGTX and NGTP software bundles provide advanced threat protection against known threats, zero-day malware and even the most sophisticated attacks.
Our two software bundles include:
As part of the Next Generation Threat Prevention & SandBlast™ software bundle (NGTX), the SandBlast Threat Emulation capability prevents infections from undiscovered exploits zero-day and targeted attacks. This innovative solution quickly inspects files and runs them in a virtual sandbox to discover malicious behavior. Discovered malware is prevented from entering the network.
The Antivirus Software Blade stops incoming malicious files at the gateway before the user is affected with real-time virus signatures and anomaly-based protections from ThreatCloud™Identify over 4.5 million malware signatures and 300,000 malicious websites with a constantly-updated worldwide network of sensors that provide ongoing malware intelligence.
The IPS Software Blade delivers complete and proactive intrusion prevention—all with the deployment and management advantages of a unified and extensible next-generation firewall solution. Complementing Check Point’s firewall protection, IPS software blade further secures your network by inspecting packets traversing through the gateway It offers full-featured IPS with Geo-protections and is constantly updated with new defenses against emerging threats.
The URL Filtering Software Blade controls access to millions of web sites by category, users, groups and machines with cloud-based technology that is constantly updated with new websites to support employee productivity and security policies. IT managers can block access to entire websites or just pages within, set enforcements by time allocation or bandwidth limitations, and maintain a list of accepted and unaccepted website URLs to fine tune security policies.
Data is transformed into security intelligence with SmartLog, an advanced log analyzer that delivers split-second search results providing real-time visibility into billions of log records over multiple time periods and domains.
Additional functionality can be added to the Check Point Threat Prevention Appliance if your security needs increase. Seamlessly add software blades such as the Data Loss Prevention Software Blade.
The ThreatCloud™ feeds security gateway software blades with real-time security intelligence gathered with the first collaborative network to fight cyber-crime. Threats discovered by Check Point sensors, by Check Point Threat Emulation-enabled gateways, and reported in third-party feeds update Threat Cloud and are distributed to Check Point connected gateways.
As part of theNext Generation Threat Prevention & SandBlast™ software bundle (NGTX), the SandBlast Threat Extraction capability removes exploitable content from documents, including active content and embedded objects, reconstructs the files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.
The Anti-Bot Software Blade detects bot-infected machines, prevents bot damages by blocking bot cyber-criminal’s Command and Control center communications, and is continually updated from ThreatCloud™.
The Application Control Software Blade controls access to over 5,200 applications and 240,000 social network widgets with the industry’s largest application coverage. It creates granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming, VoIP, games and more.
The Identity Awareness Software Blade provides granular visibility of users, groups and machines, enabling unmatched application and access control through the creation of accurate, identity-based policies.
Unified security management simplifies the monumental task of managing growing threats, devices and users by enabling views, details and reports through a single pane of glass. Check Point’s comprehensive, centralized security management system controls all Check Point gateways and Software Blades from SmartDashboard. The intuitive graphical user interface enables IT managers to easily manage a wide set of security management functions.