• Cart

Buyer's Guide

Related Article

Check Point Software & Products

Sort By
Check Point Sandblast Agent
Checkpoint Sandblast agent is a progressive new solution that extends advanced threat prevention to endpoint devices to defend against zero-day and targeted threats. With the capture and automatic analysis of complete forensics data, Sandblast Agent provides actionable attack insight and context to enable rapid remediation in the event of a breach. It provides purpose-built advanced Zero-Day Protection capabilities to web browsers and endpoints, leveraging on Check Points industry-leading network protections. Product Features Checkpoint Sandblast agent proactively blocks unknown and zero-day malware. Sandblast Agent includes Anti-Ransomware – purpose-built ransomware protection that stops ransomware in its tracks and reverses the damage automatically, ensuring organizations are protected against malicious extortion attacks that encrypt business data and demand ransom payment for its retrieval. Prevents zero-day attacks - Sandblast Agent extends the proven protections of Sandblast Zero-Day Protection to endpoint devices, as well as to web browsers. Threat Emulation discovers malicious behavior and prevents infection from new malware and targeted attacks by quickly inspecting files in a virtual sandbox. Full visibility of security events - Sandblast Agent provides full visibility with its forensics capabilities, monitoring and recording all endpoint events: files affected, processes launched, system registry changes, and network activity. This solution can trace and report the steps taken by malware, including zero-day threats. Protects against Ransomware - Sandblast Agent’s Anti-Ransomware protection prevents evasive cyber-extortion attacks which can bypass antivirus and other malware protection solutions. Anti-Ransomware uses a purpose-built behavioral analysis engine capable of detecting and remediating ransomware infections on endpoints. Blocks zero-day phishing attacks - The Zero Phishing capability within sandblast Agent uses dynamic analysis and advanced heuristics to identify and prevent access to new and unknown phishing sites targeting user credentials through web browsers in real-time. This capability prevents theft of corporate credentials from potential breaches of passwords on third party sites by alerting users when violating the corporate password re-use policies. Identifies and Contains Infections - With a local version of anti-Bot security protection, continuously updated with the latest Threat Intelligence data via Threatcloud, sandblast Agent identifies and blocks bot communications with command and control servers to contain and quarantine any infected hosts. Detailed Incident Reports - The forensics capability within sandblast Agent allows you to view event reports, triggered from the gateway or endpoint itself, from a central location using Smart Event. Security Administrators can also generate reports for known malicious events, providing a detailed cyber kill chain analysis. Flexible deployment and easy management - Sandblast Agent provides flexible deployment options to meet the security needs of every organization. Sandblast agent for browsers, Sandblast agent, and Endpoint complete Protection are the three browsers. Regardless of which package you select, the non-intrusive, low-overhead deployment utilizes a sandblast remote sandbox running as a service on either the sandblast service or your own private appliances resulting in minimal impact on local performance and full compatibility with installed applications. Actionable Incident Analysis - The forensics analysis process automatically starts when a malware event occurs, it builds a comprehensive incident summary. The summary provides key actionable attack information, including malicious events, entry point, damage scope, infected hosts. This comprehensive attack diagnostics and visibility supports remediation efforts. Comprehensive coverage across threat vectors - Sandblast Agent secures users from threats delivered via web downloads using techniques such as phishing, malicious content copied from removable storage devices, infections caused by lateral movement of data, and malware between systems on a network segment, as well as infections delivered via encrypted content. About the Company Check Point Technologies Ltd. is a leading IT security industry established in 1993 with its patented stateful inspection technology, which is still the foundation for most network security technology today. The company aims at developing numerous technologies that help secure the use of the internet by corporates and consumers while transacting and communicating. The dedicated team of Checkpoint provides customers with flexible and simple solutions that can be customized to meet the exact security needs of any organization. Checkpoint Sandblast agent is a progressive new solution that extends advanced threat prevention to endpoint devices t... Read More About Check Point Sandblast Agent
Advanced Threat Protection Automatic Detection Call Blocking +8 More
Sandblast mobile
Accurate threat detection and efficient response are critical components of preventing advanced attacks on smartphones and tablets. Traditional anti-virus and app reputation solutions can identify known threats, but they can’t detect zero-day malware or vulnerabilities in networks, operating systems, SMS messages, and apps. Accurate threat detection and efficient response are critical components of preventing advanced attacks on smartphones a... Read More About Sandblast mobile
Analytics & Reporting Phishing Protection Collaboration +7 More
Check Point Advanced Endpoint Security
About Check Point Advanced Endpoint Security Check Point Advanced Endpoint Security is an end-to-end security solution for network, data, forensics, advanced threat and EDR. It enables its users to manage the entire security suite from a single platform. It aims to remove the gaps of unprotected endpoints that put the business at risk from unauthorized access, data theft and other types of threats. Check Point Advanced Endpoint Security allows users to secure all the data irrespective of the fact that they are in transit or at rest. It is capable of providing remediation against advanced attacks. Further, the software assures its users with a continuous collection of complete data based on raw forensics. How does Check Point Advanced Endpoint Security provide remote secure access to its users? The software offers secure access to its users across all corporate networks and resources. It enables them to work from any remote location while travelling. The users get to enjoy complete privacy and integrity with the multi-factor authentication feature offered by the software. It also ensures compliance scanning of all systems. Further, all data is transmitted in an encrypted format. Users can even restore the encrypted files as per their requirement. Pricing of Check Point Advanced Endpoint Security The pricing of Check Point Advanced Endpoint Security is available as per your needs and requirements. If you want a demo of the software, send us a callback request. We will offer you an activation key. In case you are looking for license renewal, we are there for you. Compatible Platforms of Check Point Advanced Endpoint Security The software is compatible with - Microsoft Windows XP Pro (SP2) Windows 2000 Pro v. 5.00 What are the benefits of using Check Point Advanced Endpoint Security? Innovative Threat Prevention: The software offers advanced static and behavioural technologies equipped with artificial intelligence to capture high catch rates and low false rates. Central Platform: Check Point Advanced Endpoint Security offers a single management platform to its users whether on cloud or on-premises. Data Security: Users get access to advanced data security solutions with Check Point Advanced Endpoint Security. As the software enables them to secure all the data that are at rest or in transit. The capsule docs feature of the software efficiently provides protection to all the documents and only allows authorised users to access them. Zero-Day Protection: The software aims to provide protection against evasive and targeted attacks. It is also capable of providing protection against known and unknown cyber-attacks. Automated Analysis: Check Point Advanced Endpoint Security automatically analyses the forensics data and provides detailed threat reports to its users, enabling them to take the necessary measures. Remediation: The software quickly detects any type of attacks and provides adequate remediation by restoring the infected systems. Multiple Attack: Check Point Advanced Endpoint Security offers security against multiple attacks including lateral movement, web downloads, encrypted content and external storage devices. Advanced Malware Detection: The software is capable of detecting malware within 40+ file types across platforms like Microsoft Word, PowerPoint, Excel, Executables (COM, SCR, EXE), Adobe PDF, Rich Text Formats, Shockwave Flash and Archives. The software offers secure access to its users across all corporate networks and resources. It enables them to work fro... Read More About Check Point Advanced Endpoint Security
Access Control Data Security Integration +6 More
Check Point Sandblast
Checkpoint Sandblast is a cloud environment email protection for Microsoft office 365 which provides the user with varied tools for multiple layer of defences such as Antivirus, threat extraction and threat emulation. With consistent and intuitive user experience, it is easy to deploy and manage. Its pure cloud solution makes it easy to get up and run quickly. It ensures email continuity to maintain full user and business productivity. Sandblast cloud is designed to provide protection from unknown and known threats for cloud-based email environments. Checkpoint Sandblast is a cloud environment email protection for Microsoft office 365 which provides the user with varie... Read More About Check Point Sandblast
Advanced Threat Protection Automatic Detection Call Blocking +5 More
Check Point 3200 Security Application
What is Check Point 3200 Security Application Check Point 3200 Security Application is a network security solution that combines the most comprehensive security protections to help its users safeguard their branch and small office deployments. The device is available in a compact desktop form factor with a 320GB HDD. Check Point 3200 Security Application can be optimized to deliver real-time threat prevention in order to secure the critical assets and environments of a system. The security gateway is easy to deploy and manage, allowing its users to facilitate secure branch office connections with site-to-site and client-to-site VPN. Redundant appliance clustering technologies offered by the device helps eliminate even a single point of failure. What type of network security essentials are provided by Check Point 3200 Security Application? The Check Point 3200 Security Application provides complete and consolidated network security essentials in two different packages: NGTP: This package helps users in preventing sophisticated cyber threats by incorporating URL Filtering, Antivirus, Application Control, IPS, Email security and Anti-Bot. NGTX: This package combines NGTP with SandBlast zero-day protection, including threat extraction and threat emulation, to provide top grade security to its user’s system. Pricing of Check Point 3200 Security Application The pricing of Check Point 3200 Security Application is available on request. One can request a callback to get complete pricing details. Benefits of Check Point 3200 Security Application Network Security Solution There are several benefits of using the Check Point 3200 Security Application: Check Point 3200 Security Application is optimized for inspecting SSL encrypted traffic. The security gateway provides its users with the unique ‘first-time prevention’ feature for the most sophisticated zero-day attack. Users can simplify their administration through a single integrated management solution. The Check Point 3200 Security Application provides complete and consolidated network security essentials in two differe... Read More About Check Point 3200 Security Application
Real-World Production Conditions Ideal Testing Conditions Connectivity +7 More
Check Point 3100 Security Appliance
The Check Point 3100 Next Generation Security Gateway combines the most comprehensive security protections to safeguard your branch and small office deployments, all in a compact desktop form factor. This powerful Next Generation Security Gateway is optimized to deliver threat prevention for your business against present and future threats to secure your critical assets and environments The Check Point 3100 Next Generation Security Gateway combines the most comprehensive security protections to safeguard... Read More About Check Point 3100 Security Appliance
Ideal Testing Conditions Real-World Production Conditions Hardware +7 More
Check Point 1450 Security Appliance
The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering industry leading security to protect the weakest link in your enterprise network—the remote branch offices. Protect against cyber threats with Check Point Threat Prevention all in a quiet, compact desktop form factor. The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering indu... Read More About Check Point 1450 Security Appliance
Ideal Testing Conditions Real-World Production Conditions Software +5 More
Check point 1430 Next Generation Threat Prevention Appliance
What is Check Point 1430 Next Generation Threat Prevention Appliance? Check Point 1430 Next Generation Threat Prevention Appliance is a network security management device. This device is built to meet the modern security challenges that companies face today. It addresses the requirement of bandwidth and ensures an enhanced and sophisticated blocking functions. The threat prevention appliance offers unmatched security to business of all sizes. Businesses are provided with a strong platform that allows them to leverage the power and extensibility of Check Point software Blade. The software blades provide an unmatched security power under the hood. Check Point 1430 offers three times the firewall security and IPS performance than any average security device. This next-gen security appliance provides a highly scalable and flexible platform for comprehensive security and superior performance to meet the needs of any business and network environment. What types of security measures does Check Point 1430 Next Generation Threat Prevention Appliance offer? Check Point 1430 offers the following security measures: Firewall Virtual Private Network Intrusion Prevention System Application control Degree of Parallelism URL filtering Web Security Antivirus Anti-spam Identity awareness Advanced networking What features does Check Point 1430 Next Generation Threat Prevention Appliance offer? Here is a quick overview of the features offered by Check Point 1430 Next Generation Threat Prevention Appliance: Multiple VPN deployment Centralized access Full threat visibility Rapid Deployment Security against fifth generation cyber attacks Extendable software bundles Gateway provisioning automated What is the price of Check Point 1430 Next Generation Threat Prevention Appliance? The price of Check Point 1430 varies based on your business requirements. Please request a call to know about its pricing plans. Check Point 1430 Next Generation Threat Prevention Appliance is a network security management device. This device is bu... Read More About Check point 1430 Next Generation Threat Prevention Appliance
Ideal Testing Conditions Real-World Production Conditions Software +4 More
Check Point 1470 Next Generation Threat Prevention Appliance
The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering industry leading security to protect the weakest link in your enterprise network—the remote branch offices. Protect against cyber threats with Check Point Threat Prevention all in a quiet, compact desktop form factor. The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering indu... Read More About Check Point 1470 Next Generation Threat Prevention Appliance
Ideal Testing Conditions Real-World Production Conditions Software +5 More
Check Point 5200 Firewall
The Check Point 5200 Next Generation Security Gateway combines the most comprehensive security protections to safeguard your small enterprise and branch office deployments. The 5200 is a 1U Next Generation Security Gateway with one I/O expansion slot for higher port capacity, an AC or DC power supply, a 1TB (HDD) or 240GB (SSD) disk, and optional Lights-Out Management (LOM) for remote management. This powerful Next Generation Security Gateway is optimized to deliver real-world threat prevention to secure your critical assets and environments. The Check Point 5200 Next Generation Security Gateway combines the most comprehensive security protections to safeguard... Read More About Check Point 5200 Firewall
SandBlast TE Appliance TE100X

SandBlast TE Appliance TE100X

From Server

PRICE ON REQUEST
SandBlast TE Appliance TE100X perfect for customers who have regulatory or privacy concerns preventing them from using the SandBlast Threat Emulation cloud-based service. SandBlast Appliances protect you from both known and unknown threats by utilizing IPS, Antivirus, Anti-Bot, Threat Emulation (sandboxing), and Threat Extraction technologies. Threat Emulation technology employs the fastest and most accurate sandboxing engine available to pre-screen files, protecting your organization from attackers before they enter your network. Check Point Threat prevention looks inside these protected SSL and TLS tunnels to extract and launch files to discover hidden threats. SandBlast TE Appliance TE100X perfect for customers who have regulatory or privacy concerns preventing them from using t... Read More About SandBlast TE Appliance TE100X
Memory Specifications Storage Frequency +4 More
Check Point 1490 Security Appliance
The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering industry leading security to protect the weakest link in your enterprise network—the remote branch offices. Protect against cyber threats with Check Point Threat Prevention all in a quiet, compact desktop form factor. The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering indu... Read More About Check Point 1490 Security Appliance
Ideal Testing Conditions Real-World Production Conditions Software +5 More
Security Services - Enterprise Based Protection
Enterprise Based Protection (EBP) program is specially designed keeping in mind the various rapidly increasing business requirements. It covers almost all the aspect of managing an organisation. It is a safe and reliable source that focuses on providing the utmost security to its users. Enterprise Based Protection (EBP) program is meant to detect and manage threats and other malware. It will enhance the safety and security of your organisation that does not need any licence to install. Enterprise Based Protection (EBP) program is specially designed keeping in mind the various rapidly increasing business... Read More About Security Services - Enterprise Based Protection
Security Antivirus Advanced Threat Protection +1 More
Check Point Collaborative Enterprise Support
Cyber Forensics Advanced Threat Protection Security Management
Collaborative Enterprise Support
Check Point Collaborative Enterprise Support combines first-line support from your local Certified Collaborative Support Provider (CCSP) Collaborative Support Provider with full back-end support from Check Point. Check Point Collaborative Enterprise Support combines first-line support from your local Certified Collaborative Support... Read More About Collaborative Enterprise Support
Efficient Quality Service from certified security experts DEDICATED SUPPORT TEAM +2 More

  • Compare Now

Last Updated on : 09 May, 2021

Filters

close