Checkpoint software blade


















It can be easily and rapidly activated on existing Check Point Security Gateways saving time and reducing costs by leveraging existing security infrastructure. Toggle navigation. Check Point Security Gateway Blades. Add to Cart. Benefits Features Specifications. Flexible Remote Access Support Every enterprise has unique requirements for remote access. Office mode also provides enhanced anti-spoofing by ensuring that the IP address encountered by the gateway is authenticated and assigned to the user.

Visitor mode: Enables employees to access resources while they are working at a remote location such as a hotel or a customer office, where Internet connectivity may be limited to Web browsing using the standard HTTP and HTTPS ports. Hub mode: Enables rigorous, centralized inspection of all client traffic.

Controls network access on a per-application basis, letting you restrict application access by zone and direction.

Ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer.

For example, non-compliance can result in a remediation message, a warning, or restriction from the network. Provides security classifications and lets organizations protect and share documents safely with various groups - internal and external.

Provides detailed information about the device affected by the bot activity, about the bot process itself, and other relevant information. Analyzes incidents reported by other blades. Monitors files and the registry for suspicious processes and network activity. Prevents ransomware attacks. Threat Emulation sends files on the endpoint computer to a sandbox for emulation to detect evasive zero-day attacks.

Threat Extraction quickly delivers safe files while the original files are inspected for potential threats. Settings for some Software Blades are defined for computers, while others are defined for users. Windows Mac Anti-Malware Anti-Malware Protects clients from known and unknown viruses, worms, Trojan horses, adware, and keystroke loggers.

Windows Firewall Access Zones Defines the topology of the organizational network, separating it into Trusted and Internet domains. Windows Mac Firewall Firewall Blocks or allows network traffic based on attributes of network connections. Windows Mac Firewall Application Control Controls network access on a per-application basis, letting you restrict application access by zone and direction. Windows Compliance Compliance Ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer.

Windows Mac Capsule Docs Provides security classifications and lets organizations protect and share documents safely with various groups - internal and external.

Windows Mac Settings for some Software Blades are defined for computers, while others are defined for users.



0コメント

  • 1000 / 1000