
With CloudGuard, customers can implement security controls for compliance monitoring, identity and access management, and network security enforcement. This applies across on-premises, IaaS, PaaS, and SaaS infrastructures, supporting both hybrid and multi-cloud environments.
One of the key pillars of Check Point CloudGuard is cloud infrastructure identity and access authorization management, which continuously monitors user and object identities and permissions while applying zero trust principles. Additionally, risk management is enhanced through efficient log management, where hundreds of thousands of logs and alerts from various environments (including cloud) must be processed in real-time to identify the most critical and high-risk attack vectors. It is like searching for a needle in a haystack. To address this challenge, Check Point developed an advanced risk management system that focuses on the 1% of alerts that truly matter.
Next Generation Threat Prevention
(NGTP)
1 vCPU
110€
/kuu
- Firewall
- IPSec
- Mobile Access
- Advanced Networking & Clustering
- Identity Awareness
- Application Control
- Content Awareness
- IPS
- URL Filtering
- Antivirus
- Anti-Spam
- Anti-Bot
- DNS Security
Next Generation Threat Extraction & SandBlast
(NGTX)
1 vCPU
120€
/kuu
- Firewall
- IPSec
- Mobile Access
- Advanced Networking & Clustering
- Identity Awareness
- Application Control
- Content Awareness
- IPS
- URL Filtering
- Antivirus
- Anti-Spam
- Anti-Bot
- DNS Security
- SandBlast Threat Emulation
- SandBlast Threat Extraction
- Zero Phishing
Check Point CloudGuard põhilised omadused
- NGFW - Next-Generation Firewall, Intrusion Prevention System (IPS), Anti-Virus, and Anti-Bot technology proactively protects network traffic from known and unknown zero-day vulnerabilities, leveraging one of the world's largest and most advanced threat intelligence databases – Check Point ThreatCloud.
- SandBlast Zero-Day Protection sandboxing technology enhances zero-day attack protection with Threat Extraction and Threat Emulation, providing the most advanced defense against malware and zero-day threats.
- Threat Emulation prevents infections from new and unknown malware as well as targeted attacks. It utilizes one of the best detection-capable sandboxing technologies, which is practically immune to evasion techniques.
- Threat Extraction removes malware and delivers sanitized content to users.
- SSL/TLS traffic inspection monitors SSL traffic with SNI support and ensures advanced threat prevention within encrypted SSL traffic.
- Application Control prevents application-layer Distributed Denial-of-Service (DDoS) attacks and protects services.
- VPN SSL Mobile Access allows mobile users to securely connect to hybrid cloud environments using SSL-encrypted connections, two-factor authentication, and support for multiple identity providers. Secure device connections via IPSec tunnels are also supported.
- Dynamic User-Based Security Policies - Identity Firewall integration with various platforms. The solution integrates with multiple systems such as Microsoft AD, LDAP, RADIUS, and other identity providers. Security policies can be tailored to different users and groups across platforms like Windows, macOS, Linux, Android, and iOS. It allows defining which traffic is allowed, blocked, or scheduled.
- Data Loss Prevention (DLP) protects sensitive data from theft or accidental loss by offering classification for over 700 predefined data types. The solution also detects sensitive information, such as personal data or corporate secrets, helping to prevent unauthorized leaks.
- Email Scanning and Analysis includes multiple mechanisms to detect and prevent threats that may arrive via email. This covers the identification and blocking of viruses, malware, and phishing attacks.
- Unified Centralized Management ensures consistent security policy management, enforcement, and reporting across public, private, hybrid cloud, and on-premises networks. All of this is controlled from a single console, allowing automation of security processes.
- Active/Active and Active/Passive L2 and L3 High Availability (HA) ensures network availability in various configurations, preventing traffic disruptions and enabling automatic recovery in the event of failures.
- Routing Functionality supports diverse routing options, including OSPFv2, BGP, RIP, static and multicast routes, as well as policy-based routing.