人工智能-Powered安全閘道器
Protect your network with Check Point gateways, the most effective AI-powered firewalls, featuring the highest rated threat prevention, seamless scalability, and unified policy management.

Check Point named a leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewalls.
人工智慧驅動,雲端交付威脅防護
The Check Point portfolio of high-performance firewalls secures enterprises of all sizes and in all industries.

自動封鎖最容易迴避的威脅
Our firewalls have the highest security rating with a 99.9% block rate against zero day attacks, leveraging 50+ AI engines and real-time global threat intelligence

彈性和超可擴展性,達成高效運營
透過智慧防火牆叢集、自動負載平衡和 99.999% 的彈性,將網路安全性擴展至 1 Tbps 吞吐量

一個統一的策略來管理您的整體網路安全
策略和威脅可見性的黃金標準在單一控制台中提供對使用者、防火牆、應用程式、雲端等渠道提供一致且精細的存取管控
View Check Point Firewall Video (1 min)
Check Point Firewalls and Security Gateways
Check Point firewalls deliver the full range of network security, including remote access VPN, SASE, SD-WAN, and defend against IoT, DDoS, and Zero Day attacks.
保護大型至中型週邊網路的安全
Check Point Force 9000 series shares the same award-winning Layer 1-7 threat prevention and modular NICs as the rest of the family.
- Up to 25 Gbps of Layer 1-7 threat prevention with 99.9% block rates
- 高達 400 Gbps 的加速防火牆
- 彈性的 1 RU 設計可自訂混合固定連接埠與模組化網路介面選項
資料數據表:

保護您的網路:試試我們的產品選擇器
使用我們的產品選擇器,簡化您的網路安全決策。輕鬆找到合適的解決方案,為您的網路提供完善的保護。
保護企業分公司辦公室網路
在包括遠端分公司在內的所有網路點部署業界領先的威脅防護功能
- Industry-leading 99.9% Zero Day block rate
- Up to 7 Gbps advanced threat prevention throughput
- Optimized for SD-WAN to ensure best connections and employee experience
- 桌上型電腦與 1 RU 外型尺寸
資料數據表:

保護您的網路:試試我們的產品選擇器
使用我們的產品選擇器,簡化您的網路安全決策。輕鬆找到合適的解決方案,為您的網路提供完善的保護。
Check Point Maestro Hyperscale Firewall: Intelligent load balancing firewall cluster
隨著時間的推移,根據需要擴展您的網路安全,最高可達 1,000 Gbps 的第 1 層到第 7 層進階威脅防護,以及 99.999% 的彈性。
- 隨著網路需求的成長而擴展系統
- 在流量高峰期間自動將防火牆算力重新分配給關鍵應用程式
- 無縫移轉新防火牆,服務不中斷

保護您的網路:試試我們的產品選擇器
使用我們的產品選擇器,簡化您的網路安全決策。輕鬆找到合適的解決方案,為您的網路提供完善的保護。
為什麼 Check Point 人工智慧驅動、雲端交付的威脅防護受到全球超過 10 萬家企業的信賴
30 多年來領先的安全創新提供業界首屈一指的封鎖率,並定義出安全策略管理的黃金標準。
為最嚴苛的網路和資料中心提供最佳效能和最高評級的安全性
自動、即時的威脅情資讓防火牆能夠主動偵測和封鎖攻擊
- 網路吞吐量從 450 Mbps 到 1 Tbps 的進階威脅防護
- 彈性模組化設計,符合動態網路的介面要求
- 針對內部部署和雲端防火牆的統一策略管理
- 透過全面的 API 輕鬆與第三方 SOC 和自動化系統整合
最大程度的威脅防護、營運效率和安全準確性
防火牆應該是網路中最穩固的環節,而不是最薄弱的
- 抵禦日益增加的零時差攻擊
- 避免網路需求高峰期的網路延遲或延遲
- 透過簡易的授權擴充功能,防止系統過時
- 透過內部部署和雲端網路的單一策略,降低營運複雜性
Learn more about Check Point
FAQs
Check Point firewalls use advanced AI and machine learning to deliver automated threat prevention. This includes real-time detection and mitigation of known and unknown attacks, reducing manual intervention and improving security efficiency.
Based on multiple independent multi-vendor lab evaluations using live malware, phishing, and intrusion attacks, Check Point delivers the industry’s highest block rates against zero day and advanced attacks. Miercom labs rated Check Point as delivering the #1 block rate across their extensive testing, including 99.9% malware block rate and 99.7% Phishing block rate. Check Point also achieved the highest security effectiveness score from extensive multi-vendor benchmark testing by NSS Labs. Check Point delivered an outstanding 99.59% overall security effectiveness rating from NSS Labs, including 99.91% exploit coverage and complete protection from evasion strategies.
To maintain maximum threat prevention, Check Point gateways and firewalls also include Check Point’s zero day (SandBlast) protection, with advanced integrated threat emulation and sandboxing to catch and extract the most sophisticated zero-day attacks hidden in downloaded files and documents before they reach your network.
Furthermore, Check Point has maintained an outstanding track record of having highest firewall operating system integrity against being hacked. A customer’s firewall should always be the single strongest link in their network, and the least susceptible to being breached.
The single best measure of firewall resilience against being hacked and its OS quality is the total number of KEVs (Known Exploited Vulnerabilities) it has experience in the real world. KEVs are actively tracked by CISA (Cyber Security Infrastructure & Security Agency) which is the authoritative source of this data across all networking product vendors. Everyone can access CISA KEV Catalog to look up a vendor or compare all security products in a visualization tool https://kev.threatline.io/ Check Point had only a single KEV in the same period that its peers that have had 10X – 25X KEVs in the same period.
Firewall operating systems with frequently exploited vulnerabilities trigger a cascade of unplanned costs and operational pain including emergency firewall patches, expensive security team overtime, compliance reviews, business disruption, and compromised networks and IT systems.
Yes. Check Point firewalls are designed for extremely high-performance environments, offering carrier-class 99.999% uptime, multi-terabit per second throughputs, ultra-low sub-2 microsecond latency, and auto-scalability to keep up with unexpected traffic spikes. Check Point secures the most demanding enterprises and data centers around the world.
Check Point on-premises and cloud network security goes beyond traditional firewalls by providing:
- Integrated AI Security to ensure the safe use of Generative AI tools (like ChatGPT, Gemini, Perplexity, etc.) within organizations. This also identifies and secures MCP (Model Context Protocol) traffic and servers. This enables enterprises of all sizes to safely and responsibly deploy AI tools in their network environments and IT systems.
- Advanced security services including intrusion prevention, application control, and zero-day protection, including blocking threats hiding in encrypted HTTP web traffic.
AI-powered threat prevention with real-time threat intelligence that delivers instant threat updates to customers around the world - Unified policy management across on-premises, cloud, and remote sites
Hybrid Mesh Network Security enables consistent, unified security across physical, virtual, cloud, and remote environments. It simplifies management with a single console, reduces complexity, and ensures comprehensive protection everywhere your data, systems, and employees reside. Hybrid Mesh Network Security provides the three core firewall form factors required in most enterprises: On-premises hardware appliance-based firewalls, cloud network firewalls, and SASE (Secure access Services Edge), a cloud-based platform to support remote employees and systems with highly flexible and secure private/corporate access, and secure high speed public internet access.







