Content Awareness Software Blade

This Software BladeClosed Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. provides data visibility and enforcement in unified Access Control Policy.

You can set the direction of the data in the Access Control Policy to one of these:

  • Download Traffic - Into the organization

  • Upload Traffic - Out of the organization

  • Any Direction

You can set Data Types in the Access Control Policy to one of these:

  • Content Types - Classified by analyzing the file content (for example: PCI - credit card numbers, International Bank Account Numbers - IBAN)

  • File Types - Classified by analyzing the file ID (for example: Viewer File - PDF, Executable file, Presentation file)

You can select one of these services:

  • CheckPointExchangeAgent

  • ftp

  • http

  • https

  • HTTP_proxy

  • HTTPS_proxy

  • smtp

  • Squid_NTLM

For more information, see the:

Note - Content AwarenessClosed Check Point Software Blade on a Security Gateway that provides data visibility and enforcement. Acronym: CTNT. and Data Loss PreventionClosed Check Point Software Blade on a Security Gateway that detects and prevents the unauthorized transmission of confidential information outside the organization. Acronym: DLP. (see Data Loss Prevention Software Blade) use Data Types in the Access Control Policy. However, they have different features and capabilities. They work independently, and the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / ClusterXL / Scalable Platform Security Group enforces them separately.