Print Download PDF Send Feedback

Terms

Action

What a Software Blade does to traffic that matches a rule.

Affinity

The assignment of a specified CoreXL Firewall instance, VSX Virtual System, interface, user space process, or IRQ to one or more specified CPU cores.

Anti-Bot

1. An application that prevents computers from being controlled by hackers.

2. Check Point Software Blade that inspects network traffic for malicious bot software.

Anti-Virus

A solution to protect a computer or network against self-propagating programs or processes that can cause damage.

Ask

UserCheck rule action that blocks traffic and files and shows a UserCheck message. The user can agree to allow the activity.

Detect

UserCheck rule action that allows traffic and files to enter the internal network and logs them.

Event

A record of a security or network incident that is based on one or more logs, and on a customizable set of rules that are defined in the Event Policy.

Indicator

Pattern of relevant observable malicious activity in an operational cyber domain, with relevant information on how to interpret it and how to handle it.

IPS

Intrusion Prevention System. Check Point Software Blade that inspects and analyzes packets and data for numerous types of risks.

Malware Database

The Check Point database of commonly used signatures, URLs, and their related reputations, installed on a Security Gateway and used by the ThreatSpect engine.

Observable

An event or a stateful property that can be observed in an operational cyber domain.

Policy

A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.

Prevent

UserCheck rule action that blocks traffic and files and can show a UserCheck message.

Rule

A set of traffic parameters and other conditions that cause specified actions to be taken for a communication session.

Security Gateway

A computer that runs Check Point software to inspect traffic and enforces Security Policies for connected network resources.

Security Management Server

A computer that runs Check Point software to manage the objects and policies in Check Point environment.

Security Policy

A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.

SmartConsole

A Check Point GUI application used to manage Security Policies, monitor products and events, install updates, provision new devices and appliances, and manage a multi-domain environment and each domain.

STIX

Structured Threat Information eXpression. A language that describes cyber threat information in a standardized and structured way.

Threat Emulation

Protects against new malware. Virtual computers open files and are monitored for unusual and malicious behavior.

Threat Emulation Private Cloud Appliance

A Check Point appliance that is certified to support the Threat Emulation Software Blade.

ThreatCloud IntelliStore

Threat intelligence marketplace where you can select intelligence feeds (in addition to ThreatCloud feeds) from a range of security vendors that specialize in cyber intelligence. ThreatCloud translates these feeds into protections which run on Security Gateways.

ThreatCloud Repository

A cloud database with more than 250 million Command and Control (C&C) IP, URL, and DNS addresses and over 2,000 different botnet communication patterns, used by the ThreatSpect engine to classify bots and viruses.

ThreatSpect Engine

A unique multi-tiered engine that analyzes network traffic and correlates data across multiple layers (reputation, signatures, suspicious mail outbreaks, behavior patterns) to detect bots and viruses.

Traffic

The flow of data between network devices.

UserCheck

Gives users a warning when there is a potential risk of data loss or security violation. This helps users to prevent security incidents and to learn about the organizational security policy.