Check Point Next Generation Threat Prevention for 680 - subscription license

Category: Tran security and virus protection
  $269.00
 
In Stock
Quantity:
Add to Cart Print
 

View all Tran security and virus protection by Check Point Software Technologies >>


Product Id: 27137154

Description: Check Point Next Generation Threat Prevention for 680 - Subscription license ( 1 year )

Mfr Part #: CPSB-NGTP-680-1Y

A dedicated appliance focused on preventing threats attempting to enter your network. The Threat Prevention Appliance integrates market leading protection such as Firewall, Antivirus, Anti-Bot, URL Filtering, Identity Awareness and more into one convenient appliance.
Key Points
  • Comprehensive threat protection from one appliance
  • Dedicated Threat Prevention Appliance
  • Includes multiple threat prevention technologies such as Antivirus, Anti-bot, IPS, URL Filtering, Identity Awareness and more
  • Features Threat Emulation technologies to stop zero-day attacks
  • Real-time security intelligence delivered from ThreatCloud
  • Leverage the industry's first collaborative network to fight cybercrime
  • Identify over 250 million addresses analyzed for bot discovery, over 4.5 Million malware signatures and 300,000 malicious websites
  • Dynamically update attack information from worldwide network of sensors and industry's best malware feeds
  • Combine information on remote operator hideouts, botnet communication patterns and attack behavior to accurately identify bot outbreaks
  • Receive up-to-the-minute bot intelligence from the ThreatCloud knowledgebase, inlcuding zero-day bot attacks discovered by Check Point Threat Emulation
  • Protect from malicious downloads
  • Identify website delivering malware
  • Prevent malicious files from being downloaded
  • Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection
  • Maximize protection through unified management, monitoring and reporting
  • Integrated with Check Point Security Management
  • Monitor, analyze and report on risks and threats
Product Features
  • Dedicated threat appliance
    A dedicated appliance focused on preventing threats attempting to enter your network. The Threat Prevention Appliance integrates market leading protection such as Firewall, Antivirus, Anti-Bot, URL Filtering, Identity Awareness and more into one convenient appliance.
  • Powered by ThreatCloud
    The ThreatCloud feeds security gateway software blades with real-time security intelligence gathered with the first collaborative network to fight cybercrime.
  • Threat Emulation
    Discover and prevent zero-day attacks before they infect a network using sophisticated behavioral analysis of files opened and executed in a virtualized sandbox.
  • Antivirus
    Stop incoming malicious files at the gateway before the user is affected with real-time virus signatures and anomaly-based protections from ThreatCloud, the first collaborative network to fight cybercrime. Identify over 4.5 million malware signatures and 300,000 malicious websites with a constantly-updated worldwide network of sensors that provide ongoing malware intelligence.
  • Anti-bot
    Detects bot-infected machines, prevents bot damages by blocking bot cybercriminal's Command and Control center communications, and is continually updated from ThreatCloud.
  • IPS
    The IPS Software Blade delivers complete and proactive intrusion prevention - all with the deployment and management advantages of a unified and extensible next-generation firewall solution. Complementing Check Point's firewall protection, IPS software blade further secures your network by inspecting packets traversing through the gateway It offers full-featured IPS with geo-protections and is constantly updated with new defenses against emerging threats.
  • URL filtering
    Control access to millions of web sites by category, users, groups and machines with cloud-based technology that is constantly updated with new websites to support employee productivity and security policy. Block access to entire websites or just pages within, and set enforcements by time allocation or bandwidth limitations. Maintain a list of accepted and unaccepted website URLs to fine tune security policies.
  • Identity awareness
    It provides granular visibility of users, groups and machines, enabling unmatched application and access control through the creation of accurate, identity-based policies.
  • Logging and status
    It transforms data into security intelligence with SmartLog, an advanced log analyzer that delivers split-second search results providing real-time visibility into billions of log records over multiple time periods and domains.
  • Integrated security management
    Unified security management simplifies the monumental task of managing growing threats, devices and users. Check Point's comprehensive, centralized security management system controls all Check Point gateways and Software Blades from SmartDashboard. The intuitive graphical user interface enables IT managers to easily manage a wide set of security management functions.
  • Add functionality when you need it
    Check Point Threat Prevention Appliance can add additional software functionality if your security needs increase. Seamlessly add software blades such as the Data Loss Prevention Software Blade or the Application Control Software Blade.