Network Security & Firewalls
-
Check Point Quantum TE2000XN-28VM Network Security Appliance - Threat Emulation - 2 Port - 10/100/1000Base-T, 100GBase-X, 10GBase-SR - 100 Gigabit Ethernet - 2 x RJ-45 - 2 Total Expansion Slots - 1U - Rack-mountable, Rail-mountable
With the increase in sophistication of cyber threats, many targeted attacks begin with exploiting software vulnerabilities in downloaded files and email attachments. New and undiscovered threats require new solutions that go beyond signatures of known threats.
SandBlast Zero-Day Protection
Check Point SandBlast Zero-Day Protection, with evasion-resistant malware detection, provides comprehensive protection from even the most dangerous attacks while ensuring quick delivery of safe content to your users. At the core of our solution are two unique capabilities-Threat Emulation (sandboxing) and Threat Extraction (Content Disarm & Reconstruction) that take threat defense to the next level.
Evasion-resistant Sandbox
As part of the Check Point SandBlast solution, the Threat Emulation engine detects malware at the exploit phase, even before hackers can apply evasion techniques attempting to bypass the sandbox. Files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before it enters your network. This innovative solution combines CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous exploits, and zero-day and targeted attacks.
Content Disarm & Reconstruction (CDR)
In addition, the SandBlast Threat Extraction (CDR) capability immediately provides a safe version of potentially malicious content to users. Exploitable content, including active content and various forms of embedded objects, are extracted out of the reconstructed file to eliminate potential threats.
Access to the original suspicious version is blocked, until it can be fully analyzed by SandBlast Zero-Day Protection. Users have immediate access to content, and can be confident they are protected from the most advanced malware and zero-day threats.
SANDBLAST APPLIANCES
We offer a wide range of SandBlast Appliances. These are perfect for customers who have regulatory or privacy concerns preventing them from using the SandBlast Threat Emulation cloud-based service.
Unknown Threat Protection
The SandBlast Threat Emulation technology employs the fastest and most accurate sandboxing engine available to pre-screen files, protecting your organization from attackers before they enter your network. Traditional sandbox solutions detect malware behavior at the OS level-after the exploitation has occurred and the hacker code is running. They are therefore susceptible to evasion. SandBlast Threat Emulation capability utilizes a unique CPU-level inspection engine which monitors the instruction flow at the CPU-level to detect exploits attempting to bypass OS security controls, effectively stopping attacks before they have a chance to launch.
SandBlast Threat Extraction removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.
Configure Threat Extraction in one of two ways: Quickly provide a reconstructed document to the user, or await response from SandBlast Threat Emulation before determining whether or not to reconstruct the document.
Inspect Encrypted Communications
? Files delivered into the organization over SSL and TLS represent a secure attack vector that bypasses many industry standard implementations. Check Point Threat Prevention looks inside these protected SSL and TLS tunnels to extract and launch files to discover hidden threats.
Learn More$127,283.51 -
Check Point 1200R Rugged Appliance - 6 Port - 10/100/1000Base-T, 1000Base-FX - Gigabit Ethernet - 6 x RJ-45 - 2 Total Expansion Slots - Rail-mountable, Desktop
Cyberattacks on critical infrastructures & industrial environments are no longer a myth. Power generation facilities, metropolitan traffic control systems, water treatment systems, and factories are all at risk. Exploits freely available on the Internet make the Industrial Control Systems (ICS) of leading vendors easy targets for attackers.
Learn More
These ICS environments can be harsh - exposing networking equipment to extreme temperatures, humidity, dust, and vibration. They require a rugged and reliable security gateway solution to detect threats and control access to critical components.$1,311.45 -
Check Point 1200R Rugged Appliance - 6 Port - 10/100/1000Base-T - Gigabit Ethernet - 6 x RJ-45 - 2 Total Expansion Slots - Rail-mountable
Cyberattacks on critical infrastructures & industrial environments are no longer a myth. Power generation facilities, metropolitan traffic control systems, water treatment systems, and factories are all at risk. Exploits freely available on the Internet make the Industrial Control Systems (ICS) of leading vendors easy targets for attackers.
Learn More
These ICS environments can be harsh - exposing networking equipment to extreme temperatures, humidity, dust, and vibration. They require a rugged and reliable security gateway solution to detect threats and control access to critical components.$1,573.75 -
Check Point 1430 Network Security/Firewall Appliance - 8 Port - 10/100/1000Base-T - Gigabit Ethernet - Wireless LAN IEEE 802.11ac - AES (128-bit) - 8 x RJ-45 - Desktop, Rack-mountable
Small and remote branch offices need the same protections from sophisticated cyber attacks and zero-day threats as main corporate offices. The Check Point 1400 appliances are ideal for small and branch office deployments, delivering all-in-one advanced threat prevention, flexible network connectivity, and maximum port density-all in a compact, high-performance desktop form factor.
Big security in a compact footprint
- Fully integrated next-generation threat prevention including: firewall, IPS, IPsec VPN, application control, anti-spam, antivirus, anti-bot, URL filtering, email security, and user awareness
- Continuous security updates from Check Point ThreatCloud™
- Compact and quiet desktop form factor
Easy to deploy, centrally managed
- Rapid deployment via an intuitive, web-based management interface and pre-defined security policies
- Large scale, profile-based central management for maintaining hundreds of devices
Extensible security tailored for small and branch offices
- Optimized to deliver up to 1800 Mbps of real-world firewall throughput and up to 220 Mbps of real-world threat prevention throughput
- Flexible Internet access options include 1GbE copper or fiber ports and support for external 3G/4G/LTE wireless modems
- Up to 18 1GbE ports and 802.11ac Wi-Fi connectivity
$795.10 -
Check Point 1450 Network Security/Firewall Appliance - 8 Port - 1000Base-T - Gigabit Ethernet - AES (128-bit) - 8 x RJ-45 - Desktop
THE BRANCH OFFICE CHALLENGE
Learn More
In the age of global business and a more distributed workforce, remote and branch staff demand access to corporate resources in order to work effectively and efficiently. However, even a small data breach can expose companies to crippling lawsuits, penalties and loss of reputation. Branch offices need an inexpensive, yet effective solution to provide secure access to critical resources from anywhere, while minimizing the risk of a data breach.
OUR SOLUTION
The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering industry leading security to protect the weakest link in your enterprise network-the remote branch offices. Protect against cyber threats with Check Point Threat Prevention all in a quiet, compact desktop form factor.
Setup is done in minutes using our step-by-step configuration wizard. The 1400 Appliances are manageable centrally by means of the Check Point enterprise Security Management or Multi-Domain products.$1,219.20 -
Check Point 1470 Network Security/Firewall Appliance - 18 Port - 1000Base-T - Gigabit Ethernet - Wireless LAN IEEE 802.11ac - AES (128-bit) - 18 x RJ-45 - 1 Total Expansion Slots - Desktop
THE BRANCH OFFICE CHALLENGE
Learn More
In the age of global business and a more distributed workforce, remote and branch staff demand access to corporate resources in order to work effectively and efficiently. However, even a small data breach can expose companies to crippling lawsuits, penalties and loss of reputation. Branch offices need an inexpensive, yet effective solution to provide secure access to critical resources from anywhere, while minimizing the risk of a data breach.
OUR SOLUTION
The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering industry leading security to protect the weakest link in your enterprise network-the remote branch offices. Protect against cyber threats with Check Point Threat Prevention all in a quiet, compact desktop form factor.
Setup is done in minutes using our step-by-step configuration wizard. The 1400 Appliances are manageable centrally by means of the Check Point enterprise Security Management or Multi-Domain products.$2,063.91










