What a Software Blade does to traffic that matches a rule.
The assignment of a specified CoreXL Firewall instance, VSX Virtual System, interface, user space process, or IRQ to one or more specified CPU cores.
1. An application that prevents computers from being controlled by hackers.
2. Check Point Software Blade that inspects network traffic for malicious bot software.
A solution to protect a computer or network against self-propagating programs or processes that can cause damage.
UserCheck rule action that blocks traffic and files and shows a UserCheck message. The user can agree to allow the activity.
UserCheck rule action that allows traffic and files to enter the internal network and logs them.
A record of a security or network incident that is based on one or more logs, and on a customizable set of rules that are defined in the Event Policy.
Pattern of relevant observable malicious activity in an operational cyber domain, with relevant information on how to interpret it and how to handle it.
Intrusion Prevention System. Check Point Software Blade that inspects and analyzes packets and data for numerous types of risks.
The Check Point database of commonly used signatures, URLs, and their related reputations, installed on a Security Gateway and used by the ThreatSpect engine.
An event or a stateful property that can be observed in an operational cyber domain.
A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.
UserCheck rule action that blocks traffic and files and can show a UserCheck message.
A set of traffic parameters and other conditions that cause specified actions to be taken for a communication session.
A computer that runs Check Point software to inspect traffic and enforces Security Policies for connected network resources.
A computer that runs Check Point software to manage the objects and policies in Check Point environment.
A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.
A Check Point GUI application used to manage Security Policies, monitor products and events, install updates, provision new devices and appliances, and manage a multi-domain environment and each domain.
Structured Threat Information eXpression. A language that describes cyber threat information in a standardized and structured way.
Protects against new malware. Virtual computers open files and are monitored for unusual and malicious behavior.
A Check Point appliance that is certified to support the Threat Emulation Software Blade.
Threat intelligence marketplace where you can select intelligence feeds (in addition to ThreatCloud feeds) from a range of security vendors that specialize in cyber intelligence. ThreatCloud translates these feeds into protections which run on Security Gateways.
A cloud database with more than 250 million Command and Control (C&C) IP, URL, and DNS addresses and over 2,000 different botnet communication patterns, used by the ThreatSpect engine to classify bots and viruses.
A unique multi-tiered engine that analyzes network traffic and correlates data across multiple layers (reputation, signatures, suspicious mail outbreaks, behavior patterns) to detect bots and viruses.
The flow of data between network devices.
Gives users a warning when there is a potential risk of data loss or security violation. This helps users to prevent security incidents and to learn about the organizational security policy.