Network Security & Firewalls

Items 43 to 48 of 1878 total

Set Ascending Direction
per page

Grid  List 

  • Check Point Smart-1 410 Network Security/Firewall Appliance - 5 Port - 10/100/1000Base-T - Gigabit Ethernet - 5 x RJ-45 - 1U - Rack-mountable

    Managing security is becoming more complex as corporate boundaries extend to include roaming users, mobile devices and cloud environments. To manage security in this changing landscape efficiently, organizations need a security management solution that can centrally handle all security functions and deal with large volumes of mixed traffic data.

    SOLUTION
    Check Point's SMART-1 appliances consolidate security policy, log and event management into a single dedicated management appliance. SMART-1 appliances scale to fit your needs today, with the ability to adapt to future requirements. Organizations of all sizes can leverage SMART-1 to manage from 5 to 5000 gateways within their network, and accelerate time to deployment for their security infrastructures.

    Further improve security and control by utilizing SMART-1 appliances with MultiDomain Management (MDM), segmenting the network into as many as 200 independent domains by geography and business use.

    SMART-1 appliances efficiently manage and analyze security logs and events in realtime. By implementing SMART-1, organizations gain centralized visibility into millions of logs, get visual indication of risks and can quickly investigate potential threats.

    Learn More
    $12,670.68

  • Check Point Quantum 600-M Network Security Appliance - Security Management - 4 Port - 1000Base-T - Gigabit Ethernet - 4 x RJ-45 - 1U - Rack-mountable

    All-in-one security management solution, with integrated policy management, threat visibility and orchestration, enabling security consolidation across any IT environment.

    • Scalable Management on Demand
    • Faster Response to Threats
    • Efficient Security Operations

    R81 | SmartEvent | Compliance | Multi Domain Security Management

    Growing networks, disruptive technologies, and the proliferation of interconnected devices demand a new approach to managing security. Check Point Infinity architecture consolidates management of multiple security layers, providing superior policy efficiency and enabling you to manage security through a single pane of glass. The single management centrally correlates all types of events across all network environments, cloud services and mobile infrastructures.

    The Quantum Smart-1 6000-L | 6000-XL dedicated appliances are optimized for performance and scalability with both hardware and OS (operating system) hardened from the core.

    Smart-1 security management platforms double management capacity and boost performance, increasing security efficiency.

    Key Features and Benefits

    • Scale the number of managed gateways on demand
    • Respond to threats quickly with real-time event investigation, compliance, and reporting
    • Faster system response and load time with increased memory (RAM) by 50% and new SSD

    Unified Console to Manage Everything

    With one console, security teams can manage all aspects of security from policy to threat prevention - across the entire organization - on both physical and virtual environments. Consolidated management means increased operational efficiency.

    In addition to a unified console, you also now have a unified policy to manage everything from users to data to gateways. Access, controlled in one policy.

    Reports & Compliance

    Take control and monitor all your gateways in real time. Easily generate and schedule reports. Over 300 Security Best Practices, regulatory compliance checks.

    Security Efficient Operations and APIs

    Improve productivity with automation API that orchestrates workflows and aligns security with IT processes and systems.

    Real Time Integrated Threat Management

    For deep forensic analysis, we've integrated logging, monitoring, events, governance and compliance. R81 SmartConsole gives you full visibility and control across your network.

    Multi-domain Management

    Easily manage hundreds of private networks within the same infrastructure and create up to 200 domains based on geography, business unit or security function.

    Modular and Scalable

    Manage thousands of simultaneous sources, thousands of rules and millions of transactions with up to 48 TB of data storage in a single machine.

    Modular platform supporting up to 192 or 384GB RAM and 48TB of storage for any deployment environment.

    Learn More
    $40,912.56

  • Check Point Quantum 600-S Network Security Appliance - Security Management - 10 Port - 1000Base-T - Gigabit Ethernet - 10 x RJ-45 - 1U - Rack-mountable, Rail-mountable

    All-in-one security management solution, with integrated policy management, threat visibility and orchestration, enabling security consolidation across any IT environment.

    • Scalable Management on Demand
    • Faster Response to Threats
    • Efficient Security Operations

    R81 | SmartEvent | Compliance | Multi Domain Security Management

    Growing networks, disruptive technologies, and the proliferation of interconnected devices demand a new approach to managing security. Check Point Infinity architecture consolidates management of multiple security layers, providing superior policy efficiency and enabling you to manage security through a single pane of glass. The single management centrally correlates all types of events across all network environments, cloud services and mobile infrastructures.

    The Quantum Smart-1 6000-L | 6000-XL dedicated appliances are optimized for performance and scalability with both hardware and OS (operating system) hardened from the core.

    Smart-1 security management platforms double management capacity and boost performance, increasing security efficiency.

    Key Features and Benefits

    • Scale the number of managed gateways on demand
    • Respond to threats quickly with real-time event investigation, compliance, and reporting
    • Faster system response and load time with increased memory (RAM) by 50% and new SSD

    Unified Console to Manage Everything

    With one console, security teams can manage all aspects of security from policy to threat prevention - across the entire organization - on both physical and virtual environments. Consolidated management means increased operational efficiency.

    In addition to a unified console, you also now have a unified policy to manage everything from users to data to gateways. Access, controlled in one policy.

    Reports & Compliance

    Take control and monitor all your gateways in real time. Easily generate and schedule reports. Over 300 Security Best Practices, regulatory compliance checks.

    Security Efficient Operations and APIs

    Improve productivity with automation API that orchestrates workflows and aligns security with IT processes and systems.

    Real Time Integrated Threat Management

    For deep forensic analysis, we've integrated logging, monitoring, events, governance and compliance. R81 SmartConsole gives you full visibility and control across your network.

    Multi-domain Management

    Easily manage hundreds of private networks within the same infrastructure and create up to 200 domains based on geography, business unit or security function.

    Modular and Scalable

    Manage thousands of simultaneous sources, thousands of rules and millions of transactions with up to 48 TB of data storage in a single machine.

    Modular platform supporting up to 192 or 384GB RAM and 48TB of storage for any deployment environment.

    Learn More
    $7,266.08

  • Check Point Quantum TE2000XN-28VM Network Security Appliance - Threat Emulation - 2 Port - 10/100/1000Base-T, 100GBase-X, 10GBase-SR - 100 Gigabit Ethernet - 2 x RJ-45 - 2 Total Expansion Slots - 1U - Rack-mountable, Rail-mountable

    With the increase in sophistication of cyber threats, many targeted attacks begin with exploiting software vulnerabilities in downloaded files and email attachments. New and undiscovered threats require new solutions that go beyond signatures of known threats.

    SandBlast Zero-Day Protection

    Check Point SandBlast Zero-Day Protection, with evasion-resistant malware detection, provides comprehensive protection from even the most dangerous attacks while ensuring quick delivery of safe content to your users. At the core of our solution are two unique capabilities-Threat Emulation (sandboxing) and Threat Extraction (Content Disarm & Reconstruction) that take threat defense to the next level.

    Evasion-resistant Sandbox

    As part of the Check Point SandBlast solution, the Threat Emulation engine detects malware at the exploit phase, even before hackers can apply evasion techniques attempting to bypass the sandbox. Files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before it enters your network. This innovative solution combines CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous exploits, and zero-day and targeted attacks.

    Content Disarm & Reconstruction (CDR)

    In addition, the SandBlast Threat Extraction (CDR) capability immediately provides a safe version of potentially malicious content to users. Exploitable content, including active content and various forms of embedded objects, are extracted out of the reconstructed file to eliminate potential threats.

    Access to the original suspicious version is blocked, until it can be fully analyzed by SandBlast Zero-Day Protection. Users have immediate access to content, and can be confident they are protected from the most advanced malware and zero-day threats.

    SANDBLAST APPLIANCES

    We offer a wide range of SandBlast Appliances. These are perfect for customers who have regulatory or privacy concerns preventing them from using the SandBlast Threat Emulation cloud-based service.

    Unknown Threat Protection

    The SandBlast Threat Emulation technology employs the fastest and most accurate sandboxing engine available to pre-screen files, protecting your organization from attackers before they enter your network. Traditional sandbox solutions detect malware behavior at the OS level-after the exploitation has occurred and the hacker code is running. They are therefore susceptible to evasion. SandBlast Threat Emulation capability utilizes a unique CPU-level inspection engine which monitors the instruction flow at the CPU-level to detect exploits attempting to bypass OS security controls, effectively stopping attacks before they have a chance to launch.

    SandBlast Threat Extraction removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.

    Configure Threat Extraction in one of two ways: Quickly provide a reconstructed document to the user, or await response from SandBlast Threat Emulation before determining whether or not to reconstruct the document.

    Inspect Encrypted Communications

    ? Files delivered into the organization over SSL and TLS represent a secure attack vector that bypasses many industry standard implementations. Check Point Threat Prevention looks inside these protected SSL and TLS tunnels to extract and launch files to discover hidden threats.

    Learn More
    $127,283.51

  • Check Point 1200R Rugged Appliance - 6 Port - 10/100/1000Base-T, 1000Base-FX - Gigabit Ethernet - 6 x RJ-45 - 2 Total Expansion Slots - Rail-mountable, Desktop

    Cyberattacks on critical infrastructures & industrial environments are no longer a myth. Power generation facilities, metropolitan traffic control systems, water treatment systems, and factories are all at risk. Exploits freely available on the Internet make the Industrial Control Systems (ICS) of leading vendors easy targets for attackers.

    These ICS environments can be harsh - exposing networking equipment to extreme temperatures, humidity, dust, and vibration. They require a rugged and reliable security gateway solution to detect threats and control access to critical components.

    Learn More
    $1,311.45

  • Check Point 1200R Rugged Appliance - 6 Port - 10/100/1000Base-T - Gigabit Ethernet - 6 x RJ-45 - 2 Total Expansion Slots - Rail-mountable

    Cyberattacks on critical infrastructures & industrial environments are no longer a myth. Power generation facilities, metropolitan traffic control systems, water treatment systems, and factories are all at risk. Exploits freely available on the Internet make the Industrial Control Systems (ICS) of leading vendors easy targets for attackers.

    These ICS environments can be harsh - exposing networking equipment to extreme temperatures, humidity, dust, and vibration. They require a rugged and reliable security gateway solution to detect threats and control access to critical components.

    Learn More
    $1,573.75

Items 43 to 48 of 1878 total

Set Ascending Direction
per page

Grid  List