Firewall
Check Point Security Gateway
2min
Check Point Security Gateway is an industry-leading solution that safeguards networks from various threats. Known for its robust firewall, VPN, and intrusion prevention features, Check Point provides a comprehensive security framework for organizations of all sizes.
- Advanced threat prevention: Defend against sophisticated cyber-attacks, including ransomware, phishing, and zero-day exploits, with the Check Point cutting-edge threat prevention technologies.
- Next-generation firewall: Enjoy unparalleled control and visibility over your network traffic with the Check Point powerful next-generation firewall (NGFW), featuring granular application-level inspection and user-based policies.
- Intrusion prevention system (IPS): Detect and block network intrusions in real-time with the Check Point high-performance IPS, safeguarding your network from potential threats and vulnerabilities.
- Secure remote access: Provide secure remote access to your network for employees and partners with the Check Point integrated VPN and mobile access solutions, ensuring data protection and compliance.
- SandBlast threat emulation: Analyze suspicious files and URLs in a secure sandbox environment, preventing advanced threats and zero-day attacks from entering your network.
- Streamlined management: Centrally manage and monitor your Check Point Security Gateway deployment with the user-friendly SmartConsole, reducing complexity and administrative overhead.
- Scalable and high-performance: Easily scale your security infrastructure to meet the needs of your organization while maintaining top-notch performance and reliability.
- Comprehensive reporting and analytics: Gain valuable insights into your network security posture with the Check Point detailed reports and analytics, empowering you to make informed decisions and optimize your security strategy.
Check Point Security Gateway uses to hold these objects for outbound HTTPS Inspection:
- The Certificate Authority (CA) certificate (certificate buffer + key pair). The administrator creates the CA certificate and key pair before configuring the Security Gateway to work with an HSM.
- Two to three RSA key pairs for fake certificates. The initialization of the HTTPS Inspection daemon on the Security Gateway creates these keys with 1024-bit, 2048-bit, or 4096-bit lengths.
Updated 04 Dec 2024
Did this page help you?