In This Section: |
The wide adoption of social media and Web 2.0 applications changes the way people use the Internet. More than ever, businesses struggle to keep up with security challenges.
The usage of internet applications creates a new set of challenges. For example:
Employers do not know what employees are doing on the internet and how such use affects them.
As with Application Control, access to the internet and non-work-related website browsing can open networks to a variety of security threats and have a negative effect on employee productivity.
You can use URL Filtering to:
When URL Filtering is set, employee data is kept private when attempting to determine a site category. Only the host part of the URL is sent to the Check Point Online Web Service. This data is also encrypted.
Check Point Firewall innovation brings the industry’s strongest URL Filtering, application and identity control to organizations of all sizes. You can easily create Policies which detect or block thousands of applications and internet sites.
Use the Application Control and URL Filtering blades to:
Use the Check Point comprehensive AppWiki to understand what applications are used for and what their risk levels are.
Make rules to allow or block applications or internet sites, by individual application, application or URL categories, or risk levels. When you use Identity Awareness, you can easily make rules for individuals or different groups of users. You can also create an HTTPS Policy that enables the Security Gateway to inspect HTTPS traffic to prevent security risks related to the SSL protocol.
Use SmartView Tracker and SmartEvent to understand the application and site traffic that really occurs in your environment. Then change the Policy to make it even more effective. Only administrators that have been assigned with applicable permissions can see all the fields in a log. Using these permissions makes sure that restricted data is kept private in logs and cannot be seen by all administrators.
The Application and URL Filtering Database is updated regularly with applications and site categories to help you keep your Policy current. The Security Gateway connects to the Check Point Online Web Service to identify social networking widgets and website categories for URLs that it does not recognize. Results are stored on a local cache on each Security Gateway. Subsequent uncategorized URLs are first checked against the local cache before querying the Check Point Online Web Service.
You can create applications, websites, categories and groups that are not in the Application and URL Filtering Database for use in the Policy. Use these custom objects to create a Rule Base that meets your organization requirements. You can contact Check Point to create customized application signatures to be imported into the database. These signatures contain a database of internal applications that are not necessarily web-based.