Call a Specialist Today! 888-785-4407
Free Shipping! Free Shipping!

Check Point URL Filtering Software Blade
Provides optimized web security

Check Point URL Filtering Software Blade

The Check Point URL Filtering Software Blade integrates with Application Control, allowing unified enforcement and management of all aspects of web security. URL Filtering provides optimized web security through full integration in the gateway to prevent bypass through external proxies; integration of policy enforcement with Application Control for full Web and Web 2.0 protection; and UserCheck empowers and educates users on web usage policy in real time.


Protect users with cloud-based categorization and UserCheck technology

  • Dynamic cloud-based database of over 100,000,000 Websites
  • Real time updates of ever evolving and new URLs
  • Leverage UserCheck to empower users with real time alerts while educating on web policy

Fully integrated with Application Control for complete secure web usage

  • Allow unified enforcement and management across all aspects of web security
  • Define, enforce and report on web and application security policies at the user and group levels
  • Control over 100 Million websites, 4,500 Web 2.0 applications, and 225,000 widgets to achieve the highest level of web security
  • Enforce bandwidth and/or time limits to select websites or Web 2.0 applications

Optimize security and reduce Total Cost of Ownership

  • Full integration of URL Filtering into Check Point gateways eliminates bypass through external proxies and enforces inspection of all traffic--even when traversing non-standard ports
  • Scan and secure SSL encrypted traffic passing through the gateway
  • Easy one click activation leveraging the Software Blade Architecture
  • Up to 90% reduction of TCO compared to traditional point solution


Extensive and Dynamic URL Coverage

Utilize a dynamically updated database of over 100 Million Websites to allow, block or limit web site access in real-time—all web site traffic, clear and SSL-encrypted. Choose from 64 pre-defined content categories.

  • Dynamically allow, block or limit access to over 100 million Websites
  • Analyze SSL-encrypted traffic
  • Create policy rules using 64 pre-configured categories
  • Control access to complete sites or just pages within a site
  • Fine tune policies with white listing and black listing of specific URLs

Complete Web Control With Application Control Integration

Combine the URL Filtering Software Blade and the Application Control Software Blade to unify web site access control with web application and widget control for improved security and lower cost.

The Check Point URL Filtering Software Blade provides the ability to allow, block or limit access (based on time and/or bandwidth) to millions of web sites and web pages. Check Point Application Control Software Blades provides similar capabilities for 4,500 internet applications and over 225,000 web-based widgets.

Check Point unifies URL Filtering and Application Control deliver:

  • One common rule-base to simplify policy creation with joint categories for both websites and applications
  • One management console for easier management
  • One reporting system for improved visibility into web events.

URLF and App Control COmbined Rules

Combining URL Filtering and Application Control Rules

Inspect SSL Encrypted Traffic

Scan and secure SSL encrypted traffic passing through the gateway.

When traffic is passing through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver.

Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy. Some encrypted content passing through the gateway should not be inspected, and therefore can be bypassed with a simple administrator policy definition.

Engage and Educate Users with Integrated Check Point UserCheck

Use Check Point UserCheck to actively engage and educate users as they access the web to identity potential policy incidents as they occur and remediate them immediately.

Users are an integral part of the web security and control process. The best practice is to engage and educate users as they use the web to identity potential policy incidents as they occur and remediate them immediately. Check Point UserCheck, a feature of the URL Filtering software blade, enables an organization to implement this best practice saving valuable IT administration time while improving user productivity and overall security.

UserCheck and URL Filtering

Engage and Educate Web Users with UserCheck

User, Group and Machine Aware

Allow, block or limit web site access based on user, group and even machine-id for a single URL or an entire URL Category.

The ability to allow, block and limit web site access based on user, group and even machine-id is missing from most URL filtering solutions today. Check Point URL Filtering is user-aware making user, group and machine-id information readily available for policies, reporting and management purposes.

User Awareness in URL Filtering Events

User Awareness in URL Filtering Events

360° Visibility and Reporting

Achieve an unmatched level of visibility into web related security events to not only detect web access security events, but also prevent them.

Protecting an organization from dangerous, malicious or unproductive web sites is one aspect of URL Filtering. But, without visibility into web access security events, an organization increases its security risk while potentially impacting network performance and productivity.

Check Point URL Filtering seamlessly integrates with SmartEvent Software Blade to provide an unmatched level of visibility into web related security events. This enables Check Point to prevent web access related security events rather than just detecting them or worse missing them altogether.


SmartEvent and URLF Filtering

Consolidated URL Filtering and Application Control Events

Web Proxy

The Check Point Security Gateway HTTP/HTTPS Proxy feature provides flexible deployment options for the URL Filtering Software Blade.  The proxy may be configured in transparent (no client configuration necessary) or non-transparent (configuration of proxy address and port required) modes. 

Integrated into Check Point Software Blade Architecture

The URL Filtering Software Blade is integrated into the Software Blade Architecture, and can be activated easily on Check Point security Gateways. By just enabling the URL Filtering software blade inside their existing gateways, companies can save up to 90% over traditional stand-alone URL Filtering solutions.

Fully integrated into Check Point Gateways

URL Filtering is fully integrated into Check Point gateways

  • Eliminates bypass through external proxies
  • Enforces inspection of all traffic
  • Protects when traversing non-standard ports
  • Improves TCO by managing and maintaining security on one machine

Enterprise Class URL Filtering solution

  • Scales up to 7 Gbps throughput
  • Achieve up to 500,000 concurrent sessions
  • High availability clustering


Supported Appliance Families
  • Check Point 2200, 4000, 12000, 21400 and 61000 Appliances
  • Check Point Power-1
  • Check Point IP Appliances
  • Check Point UTM-1
  • Check Point IAS
Supported Operating Systems
  • GAiA
  • SecurePlatform
  • IPSO 6.2 Disk-based
  • IPSO 6.2 Flash-based
  • Windows