Check
Point Endpoint Security WebCheck
Prevents data leakage and encrypts removable media
Endpoint Security Software Blades:
- Full Disk Encryption
- Media Encryption
- Remote Access
- Anti-Malware / Program Control
- WebCheck
- Firewall / Compliance Check (included in container purchase)
*The purchase of an Endpoint container is required per user
*Includes 1 year Standard Support
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
מחירים נוספים מופיעים למטה, או לחצו כאן!
שימו לב: כל המחירים באתר כוללים מע"מ. החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.
Overview:
The Check Point WebCheck Endpoint Software Blade protects the enterprise against the rising number of web-based threats. Known and unknown web threats, such as drive-by downloads, phishing sites and zero-day attacks, are isolated with browser virtualization technology, while advanced heuristics stop users from going to dangerous sites. This software blade is easily managed by unified Endpoint Security Management.
Comprehensive web and browser security for endpoints
- Full protection against drive-by downloads and other web-based threats
- Advanced anti-phishing and site heuristics alert users about dangerous sites
- Dual-browser mode protects corporate data on endpoints from malicious software
Integrated into Check Point Software Blade Architecture
- Activate endpoint web and browser security on any endpoint
- Flexible licensing options—annual or perpetual
Centrally Managed
- Centrally managed and deployed
- Coexists and managed with other Software Security Blades
Features & Benefits:
Browser Virtualization
The WebCheck Endpoint Software Blade maximizes browser security by virtualizing the browser and creating an isolated protected sandbox for the web browser—thereby segregating corporate data from the Internet. Should a user accidentally visit an infected web site that delivers a drive-by malware download through a browser or if a malicious plug-in is downloaded, no permanent damage will result. Instead, the attack will be contained inside the virtual sandbox and deleted when the browser session ends.
Anti-Phishing
Signature matching and heuristics alert users to both known and unknown phishing pages. The Check Point heuristic detection engine identifies fraudulent copies of major financial, social networking, webmail and shopping sites.
In addition to browser virtualization, the WebCheck Endpoint Software Blade stops users from going to dangerous sites. It detects phishing web sites using a dual-mode engine comprised of a phishing site signature database and a proprietary heuristic method. The signature database is continuously updated and provides up-to-the-minute protection from known phishing web sites.
Check Point has also developed a heuristic phishing detection method that can preemptively spot fake and fraudulent copies of over fifty financial, social networking, webmail and shopping web sites. Using this heuristic anti-phishing engine, the WebCheck Endpoint Software Blade can identify threats before they are reported and placed on the signature based block lists.
Site Status Check
The WebCheck Endpoint Software Blade rates each site visited to warn users if a site has weak or suspicious credentials. Numerous attributes are examined to determine if the site is dangerous. The WebCheck Endpoint Software Blade rates each site visited to warn users if a site has weak or suspicious credentials. Numerous attributes are examined to determine if the site is dangerous. For example, the age of the domain, whether the IP is listed in public spam blocking lists, or if the site is hosted in certain foreign countries.
Centralized Management
The WebCheck Software Blade is centrally managed by the Endpoint Policy Management Software Blade, enabling central policy administration, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.
Administrators can centrally configure and manage the WebCheck Endpoint Software Blade as part of the endpoint security management console. The browser security policy can be enforced across multiple browser types including multiple versions of Windows Internet Explorer and Mozilla Firefox.
Using the web-based management console, administrators can gain quick, central insight into browser security events across the enterprise. Using the built-in reports and graphs, administrators can spot trends and investigate as needed.
Integrated into Check Point Software Blade Architecture
The WebCheck Software Blade is fully integrated into the Software Blade architecture, saving time and reducing costs by allowing customers to quickly expand security protection to meet changing requirements. Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from six Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.
Deployment:
Specifications:
Software Blade Specifications
Browser Support: | |
Operating Systems |
|
Client Platform Support: | |
Operating Systems |
|
Client Language Support | |
Languages |
|
Browser Protection
The WebCheck Endpoint Software Blade protects browsers from attacks in the following areas:
Browser Attack Target | Attack Vector |
External Browser Plug-in | Drive-by malware via plug-in outside browser (Flash, Acrobat, Office, etc.) |
Internal Browser Plug-in | Drive-by malware via plug-in inside browser |
Un-patched Vulnerabilities | Drive-by malware via browser holder |
Browser Helper Object (BHO) | Drive-by malware via plug-in outside browser |
Anti-phishing - Heuristic Protection
The WebCheck Endpoint Software Blade provides preemptive heuristic phishing protection for major web sites. Examples include:
Category | Web Site (partial list) |
Banking |
|
Ecommerce |
|
Social Networking & Webmail |
|
Documentation:
Download the Check Point Software Blade Architecture Brochure (PDF).
הערות תמחור:
- שימו לב: כל המחירים באתר כוללים מע"מ.
- החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.
- מחירי המוצרים וזמינותם כפופים לשינויים ללא הודעה מוקדמת.
*The purchase of an Endpoint container is required per user
*Includes 1 year Standard Support
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר