Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Prevent web-based threats from infiltrating your network by ensuring your traffic is secure without relying on additional proxy servers or local hardware. By effectively filtering web traffic, you can eliminate unwanted malware from accessing your networks. The Secure Web Gateway solution is designed for easy deployment and management across various locations, allowing for setup in just a matter of minutes. Devices are seamlessly routed to the nearest data center, ensuring rapid connections from any global location. Our extensive threat network spans over 100 data centers across five continents and leverages numerous high-quality threat feeds, functioning as vigilant sentinels that monitor, analyze, and report on approximately 30 billion requests daily. Whenever an unclassified web address is accessed through the Secure Web Gateway, it undergoes a thorough inspection for potential threats and is categorized into one of many classifications, ensuring the entire security network receives timely updates. This proactive approach to web security helps maintain a robust defense against evolving online threats.

Description

Web access is a major vector for cyberattacks targeting businesses. Check Point's URL Filtering feature manages access to millions of websites based on categories, users, groups, and machines, safeguarding users from harmful sites while facilitating secure Internet usage. Utilizing UserCheck technology, it provides real-time education on web usage policies, enhancing user awareness. This protection is further bolstered by cloud-based categorization and UserCheck capabilities, which can be activated on any Check Point security gateway, ultimately lowering the total cost of ownership. It also offers comprehensive security across all web-related activities by seamlessly integrating full application control. Security teams need the ability to identify, secure, and monitor every device connected to the network at all times, ensuring a robust defense. Check Point solutions equip organizations with the capability to block compromised devices from accessing sensitive corporate data and resources, which includes not only employees' mobile devices and workstations but also IoT devices and systems used in industrial control. Consequently, maintaining an organized and secure network environment becomes more achievable.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Google Digital Risk Protection

Integrations

Google Digital Risk Protection

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Avast

Founded

1988

Country

Czech Republic

Website

www.avast.com/en-us/business/cloudcare/secure-web-gateway

Vendor Details

Company Name

Check Point Software Technologies

Founded

1993

Country

United States

Website

www.checkpoint.com/products/url-filtering/

Product Features