Network Security & Firewalls
-
Check Point Quantum 6000-XL Network Security Appliance - Security Management - 4 Port - 1000Base-T - Gigabit Ethernet - 4 x RJ-45 - 2U - Rack-mountable
All-in-one security management solution, with integrated policy management, threat visibility and orchestration, enabling security consolidation across any IT environment.
- Scalable Management on Demand
- Faster Response to Threats
- Efficient Security Operations
R81 | SmartEvent | Compliance | Multi-domain Management | Automation
Growing networks, disruptive technologies, and the proliferation of interconnected devices demand a new approach to managing security. Check Point Infinity architecture consolidates management of multiple security layers, providing superior policy efficiency and enabling you to manage security through a single pane of glass. The single management centrally correlates all types of events across all network environments, cloud services and mobile infrastructures.
The Quantum Smart-1 6000-L | 6000-XL dedicated appliances are optimized for performance and scalability with both hardware and OS (operating system) hardened from the core.
Smart-1 security management platforms double management capacity and boost performance, increasing security efficiency.
Key Features and Benefits
- Scale the number of managed gateways on demand
- Respond to threats quickly with real-time event investigation, compliance, and reporting
- Faster system response and load time with increased memory (RAM) by 50% and new SSD
Unified Console to Manage Everything
With one console, security teams can manage all aspects of security from policy to threat prevention - across the entire organization - on both physical and virtual environments. Consolidated management means increased operational efficiency.
In addition to a unified console, you also now have a unified policy to manage everything from users to data to gateways. Access, controlled in one policy.
Reports & Compliance
Take control and monitor all your gateways in real time. Easily generate and schedule reports. Over 300 Security Best Practices, regulatory compliance checks.
Security Efficient Operations and APIs
Improve productivity with automation API that orchestrates workflows and aligns security with IT processes and systems.
Real Time Integrated Threat Management
For deep forensic analysis, we've integrated logging, monitoring, events, governance and compliance. R81 SmartConsole gives you full visibility and control across your network.
Multi-domain Management
Easily manage hundreds of private networks within the same infrastructure and create up to 200 domains based on geography, business unit or security function.
Modular and Scalable
Manage thousands of simultaneous sources, thousands of rules and millions of transactions with up to 48 TB of data storage in a single machine.
Modular platform supporting up to 192 or 384GB RAM and 48TB of storage for any deployment environment.
Learn More$192,600.00 -
Check Point Quantum 600-M Network Security Appliance - Security Management - 4 Port - 1000Base-T - Gigabit Ethernet - 4 x RJ-45 - 1U - Rack-mountable
All-in-one security management solution, with integrated policy management, threat visibility and orchestration, enabling security consolidation across any IT environment.
- Scalable Management on Demand
- Faster Response to Threats
- Efficient Security Operations
R81 | SmartEvent | Compliance | Multi Domain Security Management
Growing networks, disruptive technologies, and the proliferation of interconnected devices demand a new approach to managing security. Check Point Infinity architecture consolidates management of multiple security layers, providing superior policy efficiency and enabling you to manage security through a single pane of glass. The single management centrally correlates all types of events across all network environments, cloud services and mobile infrastructures.
The Quantum Smart-1 6000-L | 6000-XL dedicated appliances are optimized for performance and scalability with both hardware and OS (operating system) hardened from the core.
Smart-1 security management platforms double management capacity and boost performance, increasing security efficiency.
Key Features and Benefits
- Scale the number of managed gateways on demand
- Respond to threats quickly with real-time event investigation, compliance, and reporting
- Faster system response and load time with increased memory (RAM) by 50% and new SSD
Unified Console to Manage Everything
With one console, security teams can manage all aspects of security from policy to threat prevention - across the entire organization - on both physical and virtual environments. Consolidated management means increased operational efficiency.
In addition to a unified console, you also now have a unified policy to manage everything from users to data to gateways. Access, controlled in one policy.
Reports & Compliance
Take control and monitor all your gateways in real time. Easily generate and schedule reports. Over 300 Security Best Practices, regulatory compliance checks.
Security Efficient Operations and APIs
Improve productivity with automation API that orchestrates workflows and aligns security with IT processes and systems.
Real Time Integrated Threat Management
For deep forensic analysis, we've integrated logging, monitoring, events, governance and compliance. R81 SmartConsole gives you full visibility and control across your network.
Multi-domain Management
Easily manage hundreds of private networks within the same infrastructure and create up to 200 domains based on geography, business unit or security function.
Modular and Scalable
Manage thousands of simultaneous sources, thousands of rules and millions of transactions with up to 48 TB of data storage in a single machine.
Modular platform supporting up to 192 or 384GB RAM and 48TB of storage for any deployment environment.
Learn More$40,912.56 -
Check Point Quantum 600-S Network Security Appliance - Security Management - 10 Port - 1000Base-T - Gigabit Ethernet - 10 x RJ-45 - 1U - Rack-mountable, Rail-mountable
All-in-one security management solution, with integrated policy management, threat visibility and orchestration, enabling security consolidation across any IT environment.
- Scalable Management on Demand
- Faster Response to Threats
- Efficient Security Operations
R81 | SmartEvent | Compliance | Multi Domain Security Management
Growing networks, disruptive technologies, and the proliferation of interconnected devices demand a new approach to managing security. Check Point Infinity architecture consolidates management of multiple security layers, providing superior policy efficiency and enabling you to manage security through a single pane of glass. The single management centrally correlates all types of events across all network environments, cloud services and mobile infrastructures.
The Quantum Smart-1 6000-L | 6000-XL dedicated appliances are optimized for performance and scalability with both hardware and OS (operating system) hardened from the core.
Smart-1 security management platforms double management capacity and boost performance, increasing security efficiency.
Key Features and Benefits
- Scale the number of managed gateways on demand
- Respond to threats quickly with real-time event investigation, compliance, and reporting
- Faster system response and load time with increased memory (RAM) by 50% and new SSD
Unified Console to Manage Everything
With one console, security teams can manage all aspects of security from policy to threat prevention - across the entire organization - on both physical and virtual environments. Consolidated management means increased operational efficiency.
In addition to a unified console, you also now have a unified policy to manage everything from users to data to gateways. Access, controlled in one policy.
Reports & Compliance
Take control and monitor all your gateways in real time. Easily generate and schedule reports. Over 300 Security Best Practices, regulatory compliance checks.
Security Efficient Operations and APIs
Improve productivity with automation API that orchestrates workflows and aligns security with IT processes and systems.
Real Time Integrated Threat Management
For deep forensic analysis, we've integrated logging, monitoring, events, governance and compliance. R81 SmartConsole gives you full visibility and control across your network.
Multi-domain Management
Easily manage hundreds of private networks within the same infrastructure and create up to 200 domains based on geography, business unit or security function.
Modular and Scalable
Manage thousands of simultaneous sources, thousands of rules and millions of transactions with up to 48 TB of data storage in a single machine.
Modular platform supporting up to 192 or 384GB RAM and 48TB of storage for any deployment environment.
Learn More$7,266.08 -
Check Point Quantum TE2000XN-28VM Network Security Appliance - Threat Emulation - 2 Port - 10/100/1000Base-T, 100GBase-X, 10GBase-SR - 100 Gigabit Ethernet - 2 x RJ-45 - 2 Total Expansion Slots - 1U - Rack-mountable, Rail-mountable
With the increase in sophistication of cyber threats, many targeted attacks begin with exploiting software vulnerabilities in downloaded files and email attachments. New and undiscovered threats require new solutions that go beyond signatures of known threats.
SandBlast Zero-Day Protection
Check Point SandBlast Zero-Day Protection, with evasion-resistant malware detection, provides comprehensive protection from even the most dangerous attacks while ensuring quick delivery of safe content to your users. At the core of our solution are two unique capabilities-Threat Emulation (sandboxing) and Threat Extraction (Content Disarm & Reconstruction) that take threat defense to the next level.
Evasion-resistant Sandbox
As part of the Check Point SandBlast solution, the Threat Emulation engine detects malware at the exploit phase, even before hackers can apply evasion techniques attempting to bypass the sandbox. Files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before it enters your network. This innovative solution combines CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous exploits, and zero-day and targeted attacks.
Content Disarm & Reconstruction (CDR)
In addition, the SandBlast Threat Extraction (CDR) capability immediately provides a safe version of potentially malicious content to users. Exploitable content, including active content and various forms of embedded objects, are extracted out of the reconstructed file to eliminate potential threats.
Access to the original suspicious version is blocked, until it can be fully analyzed by SandBlast Zero-Day Protection. Users have immediate access to content, and can be confident they are protected from the most advanced malware and zero-day threats.
SANDBLAST APPLIANCES
We offer a wide range of SandBlast Appliances. These are perfect for customers who have regulatory or privacy concerns preventing them from using the SandBlast Threat Emulation cloud-based service.
Unknown Threat Protection
The SandBlast Threat Emulation technology employs the fastest and most accurate sandboxing engine available to pre-screen files, protecting your organization from attackers before they enter your network. Traditional sandbox solutions detect malware behavior at the OS level-after the exploitation has occurred and the hacker code is running. They are therefore susceptible to evasion. SandBlast Threat Emulation capability utilizes a unique CPU-level inspection engine which monitors the instruction flow at the CPU-level to detect exploits attempting to bypass OS security controls, effectively stopping attacks before they have a chance to launch.
SandBlast Threat Extraction removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.
Configure Threat Extraction in one of two ways: Quickly provide a reconstructed document to the user, or await response from SandBlast Threat Emulation before determining whether or not to reconstruct the document.
Inspect Encrypted Communications
? Files delivered into the organization over SSL and TLS represent a secure attack vector that bypasses many industry standard implementations. Check Point Threat Prevention looks inside these protected SSL and TLS tunnels to extract and launch files to discover hidden threats.
Learn More$127,283.51 -
Check Point 1430 Network Security/Firewall Appliance - 8 Port - 10/100/1000Base-T - Gigabit Ethernet - Wireless LAN IEEE 802.11ac - AES (128-bit) - 8 x RJ-45 - Desktop, Rack-mountable
Small and remote branch offices need the same protections from sophisticated cyber attacks and zero-day threats as main corporate offices. The Check Point 1400 appliances are ideal for small and branch office deployments, delivering all-in-one advanced threat prevention, flexible network connectivity, and maximum port density-all in a compact, high-performance desktop form factor.
Big security in a compact footprint
- Fully integrated next-generation threat prevention including: firewall, IPS, IPsec VPN, application control, anti-spam, antivirus, anti-bot, URL filtering, email security, and user awareness
- Continuous security updates from Check Point ThreatCloud™
- Compact and quiet desktop form factor
Easy to deploy, centrally managed
- Rapid deployment via an intuitive, web-based management interface and pre-defined security policies
- Large scale, profile-based central management for maintaining hundreds of devices
Extensible security tailored for small and branch offices
- Optimized to deliver up to 1800 Mbps of real-world firewall throughput and up to 220 Mbps of real-world threat prevention throughput
- Flexible Internet access options include 1GbE copper or fiber ports and support for external 3G/4G/LTE wireless modems
- Up to 18 1GbE ports and 802.11ac Wi-Fi connectivity
$795.10 -
Check Point 1450 Network Security/Firewall Appliance - 8 Port - 1000Base-T - Gigabit Ethernet - AES (128-bit) - 8 x RJ-45 - Desktop
THE BRANCH OFFICE CHALLENGE
Learn More
In the age of global business and a more distributed workforce, remote and branch staff demand access to corporate resources in order to work effectively and efficiently. However, even a small data breach can expose companies to crippling lawsuits, penalties and loss of reputation. Branch offices need an inexpensive, yet effective solution to provide secure access to critical resources from anywhere, while minimizing the risk of a data breach.
OUR SOLUTION
The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering industry leading security to protect the weakest link in your enterprise network-the remote branch offices. Protect against cyber threats with Check Point Threat Prevention all in a quiet, compact desktop form factor.
Setup is done in minutes using our step-by-step configuration wizard. The 1400 Appliances are manageable centrally by means of the Check Point enterprise Security Management or Multi-Domain products.$1,219.20