Sie sind auf Seite 1von 16

Check Point R80.

10 Training Bootcamp

1.6 Check Point Gateway Software Blades


Firewall Software Blade
§ Most basic Blade activated on any CHKP Firewall

§ Common features and benefits:


§ Access Control
§ Authentication
§ User Identity
§ Bridge Mode
§ Network Address Translation
§ Geo-protections

Check Point R80.10 Training Bootcamp


IPSec VPN Software Blade
§ Connect remote and mobile users, remote offices securely
through VPN

§ Common features and benefits:


§ Site-to-site VPN
§ Remote access VPN (IPSec)

Check Point R80.10 Training Bootcamp


Mobile Access Software Blade
§ Connect securely to corporate assets from your mobile or PC

§ Common features and benefits:


§ SSL/TLS or IPSec VPN tunnel
§ SSL/TLS Portal for clientless VPN connectivity
§ Two factor authentication
§ … much more

Check Point R80.10 Training Bootcamp


URL Filtering Software Blade
§ Provide web security; allow, block or limit web access in real
time

§ Common features and benefits:


§ Web access granular control
§ Inspect encrypted traffic
§ Provide web access based on user and groups
§ … and more

Check Point R80.10 Training Bootcamp


Data Loss Prevention Software Blade
§ Protect intentional or unintentional sensitive information loss

§ Common features and benefits:


§ Fingerprint sensitive files
§ Create granular DLP policies and define what to prevent and how to
prevent it
§ … and much more

Check Point R80.10 Training Bootcamp


Intrusion Prevention System Software Blade
§ Provide complete and proactive intrusion prevention

§ Common features and benefits:


§ Detect and prevent both known or unknown exploits
§ … extensive configuration options, more in future modules

Check Point R80.10 Training Bootcamp


Anti-Bot Software Blade
§ Identify infected Bot machines and stops C&C communication

§ Common features and benefits:


§ Inline Bot prevention
§ Extensive forensics reports

Check Point R80.10 Training Bootcamp


Anti-Virus Software Blade
§ Protect infrastructure leveraging real-time signatures and
anomaly-based protection

§ Common features and benefits:


§ Over 4.5 million malware signatures and 300k malicious websites
§ Prevent access to malicious content
§ Extensive forensics
§ … and more

Check Point R80.10 Training Bootcamp


Threat Emulation Software Blade
§ Sandboxing zero-day protection from new or unknown
malware attacks

§ Common features and benefits:


§ Identify and block malware
§ Leading technology for blocking anti-evasion malware
§ … and more

Check Point R80.10 Training Bootcamp


Threat Extraction Software Blade
§ Deliver sanitized (cleaned) content to users by removing
exploit content, active content or embedded objects

§ Common features and benefits:


§ Deliver safe cleaned content
§ Protect most common and used file types
§ … and more

Check Point R80.10 Training Bootcamp


Anti-Spam and Email Security Software Blade
§ Protect users with comprehensive email-security and
advanced anti-spam protection

§ Common features and benefits:


§ IP reputation anti-spam
§ Email IPS protection
§ Content based anti-spam
§ … and more

Check Point R80.10 Training Bootcamp


Content Awareness Software Blade
§ Enhanced visibility based on content transmitted through the
firewalls; file type, content type and direction configuration

§ Common features and benefits:


§ Extended visibility and enforcement
§ … and more

Check Point R80.10 Training Bootcamp


Quality of Service Software Blade
§ Bandwidth management solution

§ Common features and benefits:


§ Prioritize business-critical traffic
§ Guarantee bandwidth to specific applications
§ … and more

Check Point R80.10 Training Bootcamp


Monitoring Software Blade
§ Monitor Check Point security gateways and alert IT admin for
changes and security activities

§ Common features and benefits:


§ Gateway monitoring
§ Network traffic monitoring
§ … and more

Check Point R80.10 Training Bootcamp


Check Point R80.10 Training Bootcamp

Thank you

Das könnte Ihnen auch gefallen