0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
44 Ansichten16 Seiten
This document provides an overview of the different software blades available for Check Point firewalls. It describes the purpose and common features of the Firewall, IPSec VPN, Mobile Access, URL Filtering, Data Loss Prevention, Intrusion Prevention System, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction, Anti-Spam and Email Security, Content Awareness, Quality of Service, and Monitoring software blades. The software blades provide functions like network security, remote access, web security, data protection, intrusion prevention, malware protection, sandboxing, bandwidth management, and gateway monitoring.
This document provides an overview of the different software blades available for Check Point firewalls. It describes the purpose and common features of the Firewall, IPSec VPN, Mobile Access, URL Filtering, Data Loss Prevention, Intrusion Prevention System, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction, Anti-Spam and Email Security, Content Awareness, Quality of Service, and Monitoring software blades. The software blades provide functions like network security, remote access, web security, data protection, intrusion prevention, malware protection, sandboxing, bandwidth management, and gateway monitoring.
This document provides an overview of the different software blades available for Check Point firewalls. It describes the purpose and common features of the Firewall, IPSec VPN, Mobile Access, URL Filtering, Data Loss Prevention, Intrusion Prevention System, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction, Anti-Spam and Email Security, Content Awareness, Quality of Service, and Monitoring software blades. The software blades provide functions like network security, remote access, web security, data protection, intrusion prevention, malware protection, sandboxing, bandwidth management, and gateway monitoring.
§ Over 4.5 million malware signatures and 300k malicious websites § Prevent access to malicious content § Extensive forensics § … and more
Check Point R80.10 Training Bootcamp
Threat Emulation Software Blade § Sandboxing zero-day protection from new or unknown malware attacks
§ Common features and benefits:
§ Identify and block malware § Leading technology for blocking anti-evasion malware § … and more
Check Point R80.10 Training Bootcamp
Threat Extraction Software Blade § Deliver sanitized (cleaned) content to users by removing exploit content, active content or embedded objects
§ Common features and benefits:
§ Deliver safe cleaned content § Protect most common and used file types § … and more
Check Point R80.10 Training Bootcamp
Anti-Spam and Email Security Software Blade § Protect users with comprehensive email-security and advanced anti-spam protection
§ Common features and benefits:
§ IP reputation anti-spam § Email IPS protection § Content based anti-spam § … and more
Check Point R80.10 Training Bootcamp
Content Awareness Software Blade § Enhanced visibility based on content transmitted through the firewalls; file type, content type and direction configuration
§ Common features and benefits:
§ Extended visibility and enforcement § … and more
Check Point R80.10 Training Bootcamp
Quality of Service Software Blade § Bandwidth management solution
§ Common features and benefits:
§ Prioritize business-critical traffic § Guarantee bandwidth to specific applications § … and more
Check Point R80.10 Training Bootcamp
Monitoring Software Blade § Monitor Check Point security gateways and alert IT admin for changes and security activities
§ Common features and benefits:
§ Gateway monitoring § Network traffic monitoring § … and more