1. An application that prevents computers from being controlled by hackers.
2. Check Point Software Blade that inspects network traffic for malicious bot software.
A solution to protect a computer or network against self-propagating programs or processes that can cause damage.
1. To stop traffic before it reaches its destination.
2. To stop a command from execution.
3. To deny access by rule (though allowed by permission).
Malicious software that neutralizes Anti-Virus defenses, connects to a Command and Control center for instructions from cyber criminals, and carries out the instructions.
A performance-enhancing technology for Security Gateways on multi-core processing platforms. Multiple Check Point Firewall instances are running in parallel on multiple CPU cores.
A classification of data. The Firewall classifies incoming and outgoing traffic according to Data Types, and enforce the Policy accordingly.
Data Loss Prevention. Detects and prevents the unauthorized transmission of confidential information.
To not allow packets through the gateway, blocking the connection.
1. A record of a security incident that is based on one or more logs, and on a customizable set of rules that are defined in the Event Policy. 2. In Media Encryption, a device connects to an endpoint computer. 3. In SmartLSM, an object with schedule settings for the Security Gateway to fetch its security policy. 4. In Endpoint Security, an object with schedule settings for Active and Standby server synchronization.
The software and hardware that protects a computer network by analyzing the incoming and outgoing network traffic (packets).
The ICAP Client functionality in your Security Gateway or Cluster enables it to interact with an ICAP Server responses (see RFC 3507), modify their content, and block the matched HTTP connections.
Internet Key Exchange. An Encryption key management protocol for IPSec that creates a shared key to encrypt and decrypt IP packets and establishes a VPN tunnel and Security Association.
Intrusion Prevention System. Check Point Software Blade that inspects and analyzes packets and data for numerous types of risks.
The Mirror and Decrypt feature on your Security Gateway or Cluster performs these actions:
A group of computers, appliances, and devices that access, with authentication and encryption, the internal protected network from physically remote sites.
An encryption tunnel between a Security Gateway and remote access clients, such as Endpoint Security VPN, and communities.
A set of traffic parameters and other conditions that cause specified actions to be taken for a communication session.
The database that contains the rules in a security policy and defines the sequence, in which they are enforced.
Check Point product that accelerates IPv4 and IPv6 traffic. Installed on Security Gateways for significant performance improvements.
A computer that runs Check Point software to inspect traffic and enforces Security Policies for connected network resources.
A computer that runs Check Point software to manage the objects and policies in Check Point environment.
A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.
Physical server that hosts the events database.
A software blade is a security solution based on specific business needs.
Each blade is independent, modular and centrally managed. To extend security, additional blades can be quickly added.
A cloud database with more than 250 million Command and Control (C&C) IP, URL, and DNS addresses and over 2,000 different botnet communication patterns, used by the ThreatSpect engine to classify bots and viruses.
A unique multi-tiered engine that analyzes network traffic and correlates data across multiple layers (reputation, signatures, suspicious mail outbreaks, behavior patterns) to detect bots and viruses.
Gives users a warning when there is a potential risk of data loss or security violation. This helps users to prevent security incidents and to learn about the organizational security policy.