url filtering key features software blade - nwtech inc. · pdf filethe check point url...

3
Data Sheet: Check Point URL Filtering Software Blade ©2013 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] — All rights reserved. | 1 YOUR CHALLENGE The dynamic, constantly evolving nature of the web makes it extremely difficult to protect and enforce web usage in your corporate environment. In addition, web traffic has evolved to include not only URL traffic, but embedded URLs and applications as well. Combining these challenges with the need to customize URL protection across various users and the need to educate users on web policy, makes the task of controlling web usage challenging. OUR SOLUTION The Check Point URL Filtering Software Blade protects companies and users by utilizing cloud-based categorization of over 200 Million websites. URL Filtering provides optimized web security with full integration in the gateway, preventing bypass through external proxies; integration of policy enforcement with Application Control for full Web and Web 2.0 protection; and leveraging UserCheck, empowering and educating users on web usage policy in real time. It provides an array of superior filtering options to meet your needs: scanning and securing SSL encrypted traffic through the gateway, filtering HTTPS traffic without SSL inspection, filtering cached and translated pages, enforcing Safe Search in search engines and much more. Extensive and Dynamic URL Coverage URL Filtering utilizes a dynamically updated database of over 200 Million Websites to allow, block or limit web site access in real-time—all web site traffic, clear and SSL-encrypted. Choose from over 50 pre-defined content categories. Unified Security Over All Aspects of the Web with Application Control Integration Combine the URL Filtering Software Blade and the Application Control Software Blade to unify web site access control with Internet application and widget control for improved security and lower cost. The Check Point URL Filtering Software Blade provides the ability to allow, block or limit access to millions of web sites and web pages. Check Point Application Control Software Blades provides similar capabilities for over 4,800 internet applications and over 300,000 web-based widgets. URL Filtering Software Blade KEY FEATURES n Real time URL updates from cloud-based categorization n User and user group granularity in policy and reporting n Integration with Application control n Enforcement of Safe Search in search engines n Filtering HTTPS traffic with or without SSL inspection n Enforcements by time allocation or bandwidth limitations n Easy one click activation leveraging the Software Blade Architecture n Intuitive event analysis using granular reports and forensics tools n Also available as a part of Check Point Secure Web Gateway appliance KEY BENEFITS n Prevent malware infections and post-infection damage n Control access to millions of malware and phishing websites n Prevent browser vulnerability exploits n Achieve unified security over all aspects of the web with Application control integration n Achieve up to 60% reduction in TCO compared to traditional point solutions n Empower and educate users with real-time user alerts n Get full visibility into events and user behavior to prevent damages PRODUCT DESCRIPTION The Check Point URL Filtering Software Blade leverages real-time cloud-based URL categorization to control access to millions of malware and phishing websites

Upload: vantu

Post on 07-Mar-2018

244 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: URL Filtering KEY FEATURES Software Blade - Nwtech Inc. · PDF fileThe Check Point URL Filtering Software Blade protects companies and users by ... Engage and Educate Users with Integrated

Data Sheet: Check Point URL Filtering Software Blade

©2013 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] — All rights reserved. | 1

YOUR CHALLENGEThe dynamic, constantly evolving nature of the web makes it extremely difficult to protect and enforce web usage in your corporate environment. In addition, web traffic has evolved to include not only URL traffic, but embedded URLs and applications as well. Combining these challenges with the need to customize URL protection across various users and the need to educate users on web policy, makes the task of controlling web usage challenging.

OUR SOLUTION The Check Point URL Filtering Software Blade protects companies and users by utilizing cloud-based categorization of over 200 Million websites. URL Filtering provides optimized web security with full integration in the gateway, preventing bypass through external proxies; integration of policy enforcement with Application Control for full Web and Web 2.0 protection; and leveraging UserCheck, empowering and educating users on web usage policy in real time. It provides an array of superior filtering options to meet your needs: scanning and securing SSL encrypted traffic through the gateway, filtering HTTPS traffic without SSL inspection, filtering cached and translated pages, enforcing Safe Search in search engines and much more.

Extensive and Dynamic URL CoverageURL Filtering utilizes a dynamically updated database of over 200 Million Websites to allow, block or limit web site access in real-time—all web site traffic, clear and SSL-encrypted. Choose from over 50 pre-defined content categories.

Unified Security Over All Aspects of the Web with Application Control IntegrationCombine the URL Filtering Software Blade and the Application Control Software Blade to unify web site access control with Internet application and widget control for improved security and lower cost. The Check Point URL Filtering Software Blade provides the ability to allow, block or limit access to millions of web sites and web pages. Check Point Application Control Software Blades provides similar capabilities for over 4,800 internet applications and over 300,000 web-based widgets.

URL Filtering Software Blade

KEY FEATURESn Real time URL updates from

cloud-based categorizationn User and user group granularity in

policy and reportingn Integration with Application controln Enforcement of Safe Search in

search enginesn Filtering HTTPS traffic with or without

SSL inspectionn Enforcements by time allocation or

bandwidth limitationsn Easy one click activation leveraging

the Software Blade Architecture n Intuitive event analysis using granular

reports and forensics toolsn Also available as a part of Check Point

Secure Web Gateway appliance

KEY BENEFITSn Prevent malware infections and

post-infection damage n Control access to millions of malware

and phishing websites n Prevent browser vulnerability exploitsn Achieve unified security over all

aspects of the web with Application control integration

n Achieve up to 60% reduction in TCO compared to traditional point solutions

n Empower and educate users with real-time user alerts

n Get full visibility into events and user behavior to prevent damages

PRODUCT DESCRIPTIONThe Check Point URL Filtering Software Blade leverages real-time cloud-based URL categorization to control access to millions of malware and phishing websites

Page 2: URL Filtering KEY FEATURES Software Blade - Nwtech Inc. · PDF fileThe Check Point URL Filtering Software Blade protects companies and users by ... Engage and Educate Users with Integrated

Data Sheet: Check Point URL Filtering Software Blade

©2013 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] — All rights reserved. | 2

Check Point unified URL Filtering and Application Control deliver:

• Onecommonrule-basetosimplifypolicycreationwithjointcategories for both websites and applications.

• Onemanagementconsoleforeasiermanagement

• Onereportingsystemforimprovedvisibilityintowebevents.

User, Group and Machine AwareAllow, block or limit web site access based on user, group and even machine-id for a single URL or an entire URL Category.

Check Point URL Filtering is user-aware, making user, group and machine-id information readily available for policies, reporting and management purposes. And integration with Check Point Identity Awareness Software Blade ensures seamless, agent-less integration with Active Directory ensure.

Inspect SSL Encrypted Traffic or Choose "Lite" HTTPS FilteringScan and secure SSL encrypted traffic passing through the gateway. When traffic is passing through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver.

Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy. Some encrypted content passing through the gateway should not be inspected, and therefore can be bypassed with a simple administrator policy definition.

You can opt for "Lite" HTTPS filtering and filter HTTPS traffic without SSL inspection.

Engage and Educate Users with Integrated CheckPoint UserCheckUse Check Point UserCheck™ to actively engage and educate users as they access the web to identify potential policy incidents as they occur and remediate them immediately.

Users are an integral part of the web security and control process. The best practice is to engage and educate users as they use the web to identify potential policy incidents as they occur and remediate them immediately. Check Point UserCheck, a feature of the URL Filtering software blade, enables an organization to implement this best practice saving valuable IT administration time while improving user productivity and overall security.

Combining URL Filtering and Application Control Rules

UserCheck educates users on web use policy

Granularly manage policy from the group down to the user.

User Awareness in URL Filtering Events

Page 3: URL Filtering KEY FEATURES Software Blade - Nwtech Inc. · PDF fileThe Check Point URL Filtering Software Blade protects companies and users by ... Engage and Educate Users with Integrated

Data Sheet: Check Point URL Filtering Software Blade

©2013 Check Point Software Technologies Ltd. All rights reserved.

February 20, 2013

CONTACT CHECK POINT

Worldwide Headquarters5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected]. Headquarters959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com

360° Visibility and ReportingHaving sufficient visibility into web access security events and user behavior is an essential part of ensuring an organization's security. It helps to detect potentially malicious incidents, and prevent them from happening. Have full visibility into trends, statistics, maps and events. Get reporting that is intuitive and insightful with such features as detailed user activity and browse time details.

Check Point URL Filtering seamlessly integrates with SmartEvent Software Blade to provide an unmatched level of visibility into web related security events. This enables Check Point to prevent web access related security events rather than justdetectingthemorsimplymissingthem.

Consolidated URL Filtering and Application Control Events

Detailed User Activity Reporting

Integrated into Check Point Software Blade ArchitectureThe URL Filtering Software Blade is integrated into the Software Blade Architecture, and can be activated easily on any Check PointsecurityGateway.ByjustenablingtheURLFilteringsoftware blade inside their existing gateways, companies can save up to 60% over traditional stand-alone URL Filtering solutions.

Fully integrated into Check Point GatewaysURL Filtering is fully integrated into Check Point gateways:

• Eliminatesbypassthroughexternalproxies

• Enforcesinspectionofalltraffic

• Protectswhentraversingnon-standardports

• ImprovesTCObymanagingandmaintainingsecurity on one machine