With increasing use of Web Applications, Social Networking and instant messaging within the workplace – todays business is seeing increasing security threats and malware attacks through these Web 2.0 apps.
Protect your organisation with Check Point Application Control Software Blade.
Provides protection against increasing threat vectors and malware introduced by internet applications to identify, allow, block or limit usage of thousands of applications by user and group
Scans for and detects more than 100,000 applications and social network widgets
Policies are centrally managed from a single user-friendly console for easy administration-deployment on any Check Point security gateway.
Enables application security policies to identify, allow, block or limit usage of thousands of applications, including Web 2.0 and social networking, regardless of port, protocol or evasive technique used to traverse the network. Combined with identity awareness capabilities, IT administrators can create granular policy definitions. User and group application usage is controlled according to user or group needs and applications’ characteristics in terms of security, productivity and resource utilisation.
AppWiki enables application scanning and detection of more than 4,500 distinct applications and over 100,000 Web 2.0 widgets including instant messaging, social networking, video streaming, VoIP, games and more. Applications are classified into more than 150 categories, based on diverse criteria such as applications’ type, security risk level, resource usage, productivity implications and others. To support the dynamic nature of Internet applications, AppWiki is continuously updated.
UserCheck technology alerts employees in real-time about their application access limitations, while educating them on Internet risk and corporate usage policies. In addition to defining policies that allow or block specific applications, businesses can choose to query the user by prompting the employee to select whether an application is being used for business or personal use. This enables IT administrators to gain a better understanding of Web 2.0 usage patterns, adapt policies and regulate personal usage without interrupting the flow of business.
Integration with the Identity Awareness Software Blade enables users of the Application Control Software Blade to define granular policies to control application usage by specific users or groups of users to best balance between the organisation’s security needs and its business needs.
The Application Control Software Blade is centrally managed with Check Point security management via a user- friendly interface. Centralised management offers unmatched leverage and control of application security policies and enables organisations to use a single repository for user and group definitions, network objects, access rights and security policies across their entire security infrastructure. Unified access policies are enforced automatically throughout the distributed environment, empowering them to securely provision access from anywhere.
Using SmartEvent to view users’ online behavior and application usage provides organisations with the most granular level of visibility, leading to a better understanding of network usage and the definition of appropriate, granular control policies.