Open Frames Download Complete PDF Send Feedback Print This Page

Terms

Anti-Bot

1. Application that prevents computers from being controlled by hackers. 2. Check Point Software Blade that inspects network traffic for malicious bot software.

Anti-Virus

A solution to protect a computer or network against self-propagating programs or processes that can cause damage.

APP Wiki

A searchable application library, for Check Point Application Control and URL Filtering, with details about known Web applications and social networking widgets. (Also: AppWiki)

Block

1. To stop traffic before it reaches its destination. 2. To stop a command from execution. 3. To deny access by rule (though allowed by permission).

Bot

Malicious software that neutralizes Anti-Virus defenses, connects to a Command and Control center for instructions from cyber criminals, and carries out the instructions.

CoreXL

A performance-enhancing technology for Security Gateways on multi-core processing platforms.

CSCF

Call Session Control Function. A set of roles for SIP servers or proxies that handle SIP signal packets in the IP Multimedia Subsystem (IMS).

DBedit

A CLI tool that lets administrators make changes to objects in the Check Point databases. We recommend that administrators use the GuiDBedit tool instead of dbedit when not using scripts.

Diameter

An authentication, authorization and accounting protocol that has many features not included in the legacy RADIUS protocol.

Diameter Application

An extension to the Diameter base protocol (as defined in RFC6733). Each application contains one or more commands and/or attributes. Applications are typically associated with an RFC.

DLP

Data Loss Prevention. Detects and prevents the unauthorized transmission of confidential information.

DPD

Dead Peer Detection. A methodology for the detection of a failed IKE peer. It can reclaim lost resources when a peer fails or trigger an IKE peer failover.

Drop

To not allow packets through the gateway, blocking the connection.

Event

1. A record of a security incident that is based on one or more logs, and on a customizable set of rules that are defined in the Event Policy. 2. In Media Encryption, a device connects to an endpoint computer. 3. In SmartLSM, an object with schedule settings for the Security Gateway to fetch its security policy. 4. In Endpoint Security, an object with schedule settings for Active and Standby server synchronization.

GGSN

Gateway GPRS Support Node. The main component of a GPRS network that is responsible for communication between the GPRS network and external, packet-switched networks, such as the Internet.

GPRS

General Packet Radio Service. A packet-oriented, mobile data service that works over Global System for Mobile Communication (GSM) networks.

GSM

Global System for Mobile Communications. An international standard that defines protocols for second generation digital cellular networks used by mobile phones.

GTP

GPRS Tunneling Protocol. A set of IP-based communication protocols that handle GPRS traffic over GSM, UMTS and LTE networks.

GuiDBedit

A graphical interface tool for administrators to change objects in Check Point databases.

HSPA

High Speed Packet Access. An improved third generation mobile communication protocol that significantly enhances data transfer. It is a combination of two protocols:

HSUPA - High Speed Uplink Packet Access
HSDPA - High Speed Downlink Packet Access

IKE

Internet Key Exchange. An Encryption key management protocol for IPSec that creates a shared key to encrypt and decrypt IP packets and establishes a VPN tunnel and Security Association.

IPS

Intrusion Prevention System. Check Point Software Blade that inspects and analyzes packets and data for numerous types of risks.

IPv4 embedded IPv6 address

An IPv6 address where the rightmost 32 bits are a valid IPv4 address.

LTE

Long Term Evolution. A fourth generation communication standard for high-speed wireless communication for mobile phone and data terminals. It is based on GSM and UMTS/HSPA network technologies.

PDP

Packet Data Protocol. A packet transfer protocol used in wireless GPRS/HSDPA networks.

Performance Pack

Check Point product that accelerates IPv6 and IPv4 traffic. Installed on Security Gateways for significant performance improvements.

PLMN

Public Land Mobile Network. A network established and operated by a recognized operating agency to supply land/mobile telephony and data services.

PSWT

Public Switched Telephone Network. A collection of public circuit-switched telephone network, including telephone lines, fixed lines, microwave transmission links, cellular networks, and satellite communication.

Remote Access Community

A group of computers, appliances, and devices that access, with authentication and encryption, the internal protected network from physically remote sites.

Remote Access VPN

An encryption tunnel between a Security Gateway and remote access clients, such as Endpoint Security VPN, and communities.

Rule

A set of traffic parameters and other conditions that cause specified actions to be taken for a communication session.

Rule Base

The database that contains the rules in a security policy and defines the sequence in which they are enforced.

SA

Security Association. A VPN tunnel where all hosts on one or more subnets are associated with the tunnel. By default, Check Point VPN tunnels are created between subnets, rather than hosts.

SCTP

Stream Control Transmission Protocol. A message-based, multi-streaming transport layer protocol commonly used in telephony applications.

Security Gateway

A computer or appliance that inspects traffic and enforces Security Policies for connected network resources.

Security Management Server

The application that manages, stores, and distributes the security policy to Security Gateways.

Security Policy

A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources through the use of packet inspection.

SGSN

Serving GPRS Support Node. The component of a GPRS network that is responsible for delivery of data packets to and from mobile stations in its geographical service area.

SIP

Session Initiation Protocol. A signaling protocol used for controlling multimedia communication sessions, such as voice and video calls over an IP network.

SmartDashboard

A Check Point client used to create and manage the security policy.

SmartEvent Server

Physical server that hosts the events database.

Software Blade

A software blade is a security solution based on specific business needs.

Each blade is independent, modular and centrally managed. To extend security, additional blades can be quickly added.

ThreatCloud Repository

A cloud database with more than 250 million Command and Control (C&C) IP, URL, and DNS addresses and over 2,000 different botnet communication patterns, used by the ThreatSpect engine to classify bots and viruses.

ThreatSpect Engine

A unique multi-tiered engine that analyzes network traffic and correlates data across multiple layers (reputation, signatures, suspicious mail outbreaks, behavior patterns) to detect bots and viruses.

UserCheck

Gives users a warning when there is a potential risk of data loss or security violation. This helps users to prevent security incidents and to learn about the organizational security policy.

UTMS

Universal Mobile Telecommunications System. A third generation, packet-based, mobile cellular technology for networks based on the GSM standard.

 
Top of Page ©2015 Check Point Software Technologies Ltd. All rights reserved. Download PDF Send Feedback Print