Check Point URL Filtering Software Blade
Provides optimized web security
The Check Point URL Filtering Software Blade integrates with Application Control, allowing unified enforcement and management of all aspects of web security. URL Filtering provides optimized web security through full integration in the gateway to prevent bypass through external proxies; integration of policy enforcement with Application Control for full Web and Web 2.0 protection; and UserCheck empowers and educates users on web usage policy in real time.
Protect users with cloud-based categorization and UserCheck technology
- Dynamic cloud-based database of over 100,000,000 Websites
- Real time updates of ever evolving and new URLs
- Leverage UserCheck to empower users with real time alerts while educating on web policy
Fully integrated with Application Control for complete secure web usage
- Allow unified enforcement and management across all aspects of web security
- Define, enforce and report on web and application security policies at the user and group levels
- Control over 100 Million websites, 4,500 Web 2.0 applications, and 225,000 widgets to achieve the highest level of web security
- Enforce bandwidth and/or time limits to select websites or Web 2.0 applications
Optimize security and reduce Total Cost of Ownership
- Full integration of URL Filtering into Check Point gateways eliminates bypass through external proxies and enforces inspection of all traffic--even when traversing non-standard ports
- Scan and secure SSL encrypted traffic passing through the gateway
- Easy one click activation leveraging the Software Blade Architecture
- Up to 90% reduction of TCO compared to traditional point solution
Extensive and Dynamic URL Coverage
Utilize a dynamically updated database of over 100 Million Websites to allow, block or limit web site access in real-time—all web site traffic, clear and SSL-encrypted. Choose from 64 pre-defined content categories.
- Dynamically allow, block or limit access to over 100 million Websites
- Analyze SSL-encrypted traffic
- Create policy rules using 64 pre-configured categories
- Control access to complete sites or just pages within a site
- Fine tune policies with white listing and black listing of specific URLs
Complete Web Control With Application Control Integration
Combine the URL Filtering Software Blade and the Application Control Software Blade to unify web site access control with web application and widget control for improved security and lower cost.
The Check Point URL Filtering Software Blade provides the ability to allow, block or limit access (based on time and/or bandwidth) to millions of web sites and web pages. Check Point Application Control Software Blades provides similar capabilities for 4,500 internet applications and over 225,000 web-based widgets.
Check Point unifies URL Filtering and Application Control deliver:
- One common rule-base to simplify policy creation with joint categories for both websites and applications
- One management console for easier management
- One reporting system for improved visibility into web events.
Combining URL Filtering and Application Control Rules
Inspect SSL Encrypted Traffic
Scan and secure SSL encrypted traffic passing through the gateway.
When traffic is passing through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver.
Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy. Some encrypted content passing through the gateway should not be inspected, and therefore can be bypassed with a simple administrator policy definition.
Engage and Educate Users with Integrated Check Point UserCheck
Use Check Point UserCheck to actively engage and educate users as they access the web to identity potential policy incidents as they occur and remediate them immediately.
Users are an integral part of the web security and control process. The best practice is to engage and educate users as they use the web to identity potential policy incidents as they occur and remediate them immediately. Check Point UserCheck, a feature of the URL Filtering software blade, enables an organization to implement this best practice saving valuable IT administration time while improving user productivity and overall security.
Engage and Educate Web Users with UserCheck
User, Group and Machine Aware
Allow, block or limit web site access based on user, group and even machine-id for a single URL or an entire URL Category.
The ability to allow, block and limit web site access based on user, group and even machine-id is missing from most URL filtering solutions today. Check Point URL Filtering is user-aware making user, group and machine-id information readily available for policies, reporting and management purposes.
User Awareness in URL Filtering Events
360° Visibility and Reporting
Achieve an unmatched level of visibility into web related security events to not only detect web access security events, but also prevent them.
Protecting an organization from dangerous, malicious or unproductive web sites is one aspect of URL Filtering. But, without visibility into web access security events, an organization increases its security risk while potentially impacting network performance and productivity.
Check Point URL Filtering seamlessly integrates with SmartEvent Software Blade to provide an unmatched level of visibility into web related security events. This enables Check Point to prevent web access related security events rather than just detecting them or worse missing them altogether.
Consolidated URL Filtering and Application Control Events
The Check Point Security Gateway HTTP/HTTPS Proxy feature provides flexible deployment options for the URL Filtering Software Blade. The proxy may be configured in transparent (no client configuration necessary) or non-transparent (configuration of proxy address and port required) modes.
Integrated into Check Point Software Blade Architecture
The URL Filtering Software Blade is integrated into the Software Blade Architecture, and can be activated easily on Check Point security Gateways. By just enabling the URL Filtering software blade inside their existing gateways, companies can save up to 90% over traditional stand-alone URL Filtering solutions.
Fully integrated into Check Point Gateways
URL Filtering is fully integrated into Check Point gateways
- Eliminates bypass through external proxies
- Enforces inspection of all traffic
- Protects when traversing non-standard ports
- Improves TCO by managing and maintaining security on one machine
Enterprise Class URL Filtering solution
- Scales up to 7 Gbps throughput
- Achieve up to 500,000 concurrent sessions
- High availability clustering
|Supported Appliance Families|
|Supported Operating Systems|