Datasheet: Check Point Secure Web Gateway Appliances

Check Point Secure Web Gateway Appliances Secure Web Gateway is an all-in-one solution that enables secure use of Web 2.0 with real time multilayered protection against webborne malware, largest application coverage and granular application control, centralized intuitive management, and end-user education.

Check Point Secure Web Gateway Appliances

KEY FEATURES n

Check Point has been a leading security provider for twenty years, protecting customers from an ever changing threat environment. The Check Point approach to the Secure Web Gateway leverages its security expertise and industry’s most complete portfolio of security innovations to deliver the protection required to defend against web-borne malware, the number one threat to organizations. Web access is now ubiquitous and considered an essential workplace “norm.” The web has also become the predominant route for attacks on enterprises. Attackers are targeting enterprise users by driving them to malware infested websites. Recent Check Point research found that in 74% of organizations, hosts are accessing a malicious website, doing so once every 1.5 hours. And this risk becomes even greater when employees use high risk applications. In the same Check Point research, 91% of organizations’ users were found to be accessing applications with a potential security risk. As the sophistication level of attackers continue to rise, the role of the secure web gateway has become critical to protect against web-borne malware. An effective secure web gateway must provide multi-layer security to protect against the most sophisticated forms of malware and prevent attacks.

OVERVIEW Secure Web Gateway is an all-in-one solution that enables secure use of Web 2.0 with real time multi-layered protection against web-borne malware, largest application coverage and granular application control, centralized intuitive management, and end-user education. It is built with the most powerful combination of Web security features, including: • Antivirus to identify and block sophisticated malware • Threat Cloud’s global security intelligence to identify malware • URL Filtering to control access to millions of malware and phishing websites • Granular Application Control to block usage of dangerous apps or specific features • Optional IPS and Anti-bot to fight web driven cyber attacks • SmartEvent for 360 degree visibility over all web users and activities • Unified Policy that covers all web, applications, users and machines

Dedicated appliance integrating Antivirus, URL Filtering, Application Control, Identity Awareness and Analysis and Reporting with optional IPS and Anti-bot blades n Real time URL updates from cloud-based categorization n Largest app library with over 4,800 apps, 240,000 widgets, and 130 categories n Unified security for all aspects of the web n User and user group granularity in policy and reporting n Multi-layered security to stop malware with ThreatCloud™ global security intelligence n Intuitive event analysis using granular reports and forensics tools

KEY BENEFITS n

Prevent malware infections and post-infection damage with multi-layered security n Control access to malware infested websites and higher risk applications n Prevent browser and application vulnerability exploits n Enhance operational activity with unified, centralized management n Benefit from the only solution that protects Web-based activities with unified control, enforcement and reporting

©2013 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] - All rights reserved | 1

Datasheet: Check Point Secure Web Gateway Appliances

Check Point’s Secure Web Gateway solution has flexible deployment options including stand-alone dedicated appliances that comes in a variety of models to fit branch and small offices, medium, large and extra-large enterprises, and secure web software packages that are available on any security gateway.

SECURE WEB GATEWAY FEATURES Antivirus Stop incoming malicious files at the gateway before the user is affected with real-time virus signatures and anomaly-based protections from ThreatCloud, the first collaborative network to fight cybercrime. Identify over 9 million signatures and 900,000 malicious websites with a constantly-updated worldwide network of sensors that provide ongoing malware intelligence. ThreadCloud Real time protection information delivered to the Secure Web Gateway. Dynamically updated, using a worldwide network of threat sensors, this is the first real time collaborative network to effectively fight cybercrime. URL Filtering Control access to millions of web sites by category, users, groups and machines with cloud-based technology that is constantly updated with new websites to support employee productivity and security policy. Block access to entire websites or just pages within, and set enforcements by time allocation or bandwidth limitations. Maintain a list of accepted and unaccepted website URLs to fine tune security policies. Application Control Control access to over 4,8 00 applications and 240,000 social network widgets with the industry’s largest application coverage. Create granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming,VoIP,games and more. Enable business while ensuring security. IPS (Optional) NSS Labs top-rated IPS Software Blade delivers complete and proactive intrusion prevention. Ranked #1 in Microsoft and Adobe threat coverage 3 years in a row, it secures your network by timely and effectively preventing browser and application vulnerability exploits.

Identity Awareness Control access to company resources and the internet by user, group or machine for granular visibility and policy enforcement. Easily distinguish between employees and guests or contractors and restrict access to prevent unwanted data loss or threats to data centers, networks and applications. Prevent unauthorized access to corporate resources while allowing authorized users to work remotely. Unified Security Policy Traditional internet security requires establishing policies for each element of securing the web. Check Point’s Web Security Gateway Appliance is the only solution to offer unified control over all websites, web applications, users and machines. This significantly reduces the complexity of securing the internet and enables organizations to more easily and cost-effectively implement and enforce corporate security policies.

Integrated Security Management Unified security management simplifies the monumental task of managing growing threats, devices and users. Our comprehensive, centralized security management system controls all Check Point gateways and Software Blades from SmartDashboard. The intuitive graphical user interface enables IT managers to easily manage a wide set of security management functions. Check Point UserCheck Engage and educate users about corporate policy and internet safety without involving IT personnel with a real-time pop-up agent that offers users advice and the opportunity to reconsider current online activities. Engaging users in the decision-making process increases awareness which can help organizations mitigate the security risks associated with enterprise internet use.

Anti-bot (Optional) Extend your Secure Web Gateway to identify infected hosts and prevent bot damage. Detect infected hosts, accurately identify bot outbreaks, block bot communication between infected hosts and remote operator, and receive up-to-the minute bot intelligence from the ThreatCloud knowledge base.

©2013 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] - All rights reserved 2

|

Datasheet: Check Point Secure Web Gateway Appliances

Inspection of SSL Encrypted Traffic Scan and secure SSL encrypted traffic passing through the gateway. When traffic is passing through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver. Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy. Some encrypted content passing through the gateway should not be inspected, and therefore can be bypassed with a simple administrator policy definition.

Multiple Deployment Options Check Point Secure Web Gateway has flexible deployment options to support a multitude of business needs and sizes including inline installation as well as the option to set your gateway to act as a proxy. Add Functionality When You Need It Check Point Secure Web Gateway can add additional software functionality if your security needs increase. Seamlessly add software blades such as the Anti-Bot and IPS.

SmartEvent Quickly stop critical security events and add on-the-fly protections with our unified security event management. SmartEvent correlates all the activity from your Check Point products and 3rd party devices and provides a security timeline including trends, statistics and maps for a detailed snapshot of your security status. Leverage offline reporting and numerous pre-defined security events plus an event-wizard to customize your own events. Schedule and email offline reports, in PDF, HTML or excel format, of top used applications and accessed sites, detailed user Web activity and more.

©2013 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] - All rights reserved 3

|

Datasheet: Check Point Secure Web Gateway Appliances

Specifications SWG-4400

SWG-4600

SWG-4800

SWG-12400

SWG-12600

up to 250

up to 500

up to 1,000 users

up to 5,000 users

up to 10,000 users

20,000

32,000

50,000

66,000

160,000

650

1,000

1,800

2,500

5,700

2,700

4,200

7,000

10,000

22,000

2

2

4

6

12

Memory

4 GB

4 GB

8 GB

Storage

250 GB

250 GB

250 GB

Sizing Users (recommended)1 Concurrent Connections Connections per Second HTTP Transactions per Second System Resources Cores

8 GB (up to 12 GB) 500 GB (up to 2x500 GB)

12 GB 2x500 GB

8 x 10/100/1000Base-T RJ45 ports

8 x 10/100/1000Base-T RJ45 ports

8 x 10/100/1000Base-T RJ45 ports

2 on board 1GbE copper 8 x 1GbE copper interface card

One AC power supply

One AC power supply

One AC power supply

Redundant dual hot-swappable

2 on board 1GbE copper 4 x 1GbE copper interface card 8 x 1GbE copper interface card Redundant dual hot-swappable

NA

NA

Yes

Yes

Yes

1U

1U

1U

2U

2U

17.25 x 12.56 x 1.73 in.

17.25 x 12.56 x 1.73 in.

17.25 x 16.14 x 1.73 in.

17.24 x 22.13 x 3.46 in.

17.24 x 22.13 x 3.46 in.

Metric (W x D x H)

438 x 320 x 44 mm

438 x 320 x 44 mm

438 x 410 x 44 mm

438 x 562 x 88 mm

438 x 562 x 88 mm

Weight

7.5 kg (16.53 lbs.)

7.5 kg (16.53 lbs.)

7.6 kg (16.76 lbs.)

23.4 kg (51.6 lbs.)

23.4 kg (51.6 lbs.)

AC Input Voltage

100 - 240V

100 - 240V

100 - 240V

100 - 240V

100 - 240V

Frequency

50 - 60 Hz

50 - 60 Hz

47 - 63 Hz

47 - 63 Hz

47 - 63 Hz

250W

250W

275W

300W

400W

90W

90W

140W

132W

220W

240.1 BTU

240.1 BTU

425.6 BTU

450.4 BTU

750.6 BTU

Network Interfaces

Power Supply LOM Dimensions Enclosure Standard (W x D x H)

Power Requirements

Single Power Supply Rating Power Consumption Maximum Maximum thermal output 1

There is no license limitation on the number of supported users. • All models: Bypass card optional • All models: Deploy in line, as proxy or tap • All models: Locally or centrally manage

contact check point

Worldwide Headquarters 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected] U.S. Headquarters 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com

©2013 Check Point Software Technologies Ltd. All rights reserved. January 16, 2013

Secure Web Gateway Appliance Datasheet.pdf

157. Whoops! There was a problem loading this page. Retrying... Secure Web Gateway Appliance Datasheet.pdf. Secure Web Gateway Appliance Datasheet.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Secure Web Gateway Appliance Datasheet.pdf. Page 1 of 60.

897KB Sizes 5 Downloads 186 Views

Recommend Documents

Formal Techniques for an ITSEC-E4 Secure Gateway
how information should flow from one LAN to the other and internal security ..... associates every active object with a unique classification level. Line 9 states ...

Secure Gateway System Design for Home Teleworking
Feb 1, 2015 - Home Teleworking has become a major workstyle for corporate and part-time workers. As high-speed .... NAT/NAPT at the gateway system, and no UDP-based services .... audio-visual streaming and the IP phone are heav-.

EV Gateway, WEB-Trader, EV-Post functions - European Medicines ...
An agency of the European Union. EV Reporting process for users: EV Gateway, WEB-Trader, EV-Post functions. Training Module EV-M3a ...

iron-clad-java-building-secure-web-applications.pdf
Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. iron-clad-java-building-secure-web-appli

secure java for web application development pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. secure java for ...

A More Secure Approach to Dynamic Web Threats ...
Network Security. “Partnering with clients to create innovative growth strategies” ... virus signatures are no longer effective in stopping Web-borne threats. A new ...

secure java for web application development pdf
development pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. secure java for web application development pdf.

Semantics-based design for Secure Web Services
May 30, 2015 - these features in our examples, because their treatment can be directly inherited from λreq . Semantics of ...... 16, center) exposes the kinds of faults REP1,...,REPn the garage. May 30 ..... Alpha Works, 2003. [34] Li Gong.

A More Secure Approach to Dynamic Web Threats ...
Solving the Content Filtering Challenge With On-Demand Services. 5 ... one that can respond to dynamic threats in real-time, is needed to secure this vital.

Google Search Appliance
Experimenting with Host Crowding Options. 56 .... Search Experience Administration Best Practices ... Formulating and entering a search query on a Web page. 2. ... Google Search Appliance: Creating the Search Experience. Introduction. 10.

Google Search Appliance
Email updates that users can receive that provide the latest relevant search results ... Each indexed page can be served in a cached HTML format (up to 4 million.

Google Search Appliance
The search appliance also supports the use of digital certificates to perform X.509 ...... appliance tries to verify the digital signature of the assertion and the SAML ...

The Rouge Gateway Project Gateway Partner Meeting 23 June 11 ...
The Rouge Gateway Project Gateway Partner Meeting 23 June 11.pdf. The Rouge Gateway Project Gateway Partner Meeting 23 June 11.pdf. Open. Extract.

Google Search Appliance
Restricting Search Results by Domain Name. 58. Restricting ..... Hands-free headband microphone with a portable amplifier. ..... Sorting the results by relevance—The search appliance uses over 100 different algorithms to sort results by ...

Giza Tile Serving Appliance - AppGeo
desktop GIS software and mapping web-sites easily and with fast performance. What is Giza? Giza is ... View detailed stats on WMS and WMTS consumption by.

7.2 - Search Appliance Internationalization - googleusercontent.com
synonyms for your business's internal abbreviations, code names, and other ... If the content-type header or http-equiv meta tag for the web page or .... For example, the search term “latest apple” might be expanded to include “apples,” “fruit,”.

13500-appliance-datasheet.pdf
module as us. e window and ... Redundant dual AC or DC hot-swappable power supplies. Redundant dual ... Page 3 of 5. 13500-appliance-datasheet.pdf.

7.2 - Search Appliance Internationalization
search query. For example, the search term “latest apple” might be expanded to include “apples,” “fruit,” and “ipod.” The search appliance performs this type of ...

Giza Tile Serving Appliance - AppGeo
desktop GIS software and mapping web-sites easily and with fast performance. What is Giza? Giza is a ... map-based user interface. ○ ... these sound like you?

Giza Tile Serving Appliance - AppGeo
What is Giza? Giza is a Node.js server application that runs on virtual servers hosted in the Google GCP, or. Amazon AWS cloud. The Giza Appliance accesses.

7.4 - Search Appliance Internationalization
... registered trademarks or service marks of Google, Inc. All other trademarks are ..... For example, the search term “latest apple” might be expanded to include ...

Google Search Appliance Cloud
What's New ... make suggestions, like the topic suggestions Google provides when ... service offerings online, the City of Calgary implemented the GSA to meet their ... employees only see permission-based results. ... specific criteria such as collec

Giza Tile Serving Appliance - AppGeo
desktop GIS software and mapping web-sites easily and with fast performance. What is Giza? Giza is a Node.js server application that runs on virtual servers ...