Check Point Next Generation Firewalls (NGFWs) Features
Security - Unified Threat Management (6)
Antivirus
Tools to protect a system from viruses by scanning and quarantining any threats.
Whitelists
The ability to green light a specific URL or system to bypass the scanning process.
Antispam Filtering
Tools to prevent spam emails and other spam from entering the network.
Content Filtering
Tools to filter specific content based on the MME type or file extension.
Web Filtering
Tools to block certain websites from being viewed by those in a network.
Firewall
Tools to block off a network or system from outside networks or systems to protect the data within.
Administration (9)
Reports & Analytics
The ability to digest a large amount of data into visual representations and analytics.
Dashboard
The ability to view a large amount of data in one place using customizable widgets.
Data Management
Administrators can access and organize data related to incidents to produce reports or make data more navigable.
Incident Logs
Information on each incident is stored in databases for user reference and analytics.
Reporting
Produces reports detailing trends and vulnerabilities related to bot management and performance.
Policy Management
Provides network security features to customize network access rules, workflows, and compliance requirements.
Logging and Reporting
Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis.
Application Gateway
Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers.
Concurrent Sessions
Determines the number of connections a firewall is able to track and facilitate securely.
Governance (3)
Access Control
Supports LDAP Protocol to enable access control and governance.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Data Visibility
Similifies data identification to increase visibility and management capabilities
Security (8)
Encryption
Protects data with within and as it leaves your secure or local network.
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Activity Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Breach Detection
Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.
Security Automation
Allows administrative control over automated security tasks.
Application Security
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Network Management (4)
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Identity Management (3)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Monitoring (7)
Load Balancing
Monitors traffic and distribute resources and scales infrastructure workloads to match traffic.
Continuous Analysis
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Intrusion Prevention
Enforces security paramaters to prevent unauthorized access.
Intrusion Detection
Detects unauthorized access and use of privileged systems.
Network Monitoring
Monitor the performance of network resources, such as switches, routers, and servers.
Network Discovery
Automatically discover network assets.
Network Asset Mapping
Build map of network resources based on dependencies and connections.
Functionality (8)
Virtual Private Network (VPN)
Provides a virtualized network for client network to mask identity, location, and other sensitive information.
Antivirus
Provides malware protection capabilities in addition to traditional firewall barrier technology.
URL Filtering
Provides access control tools to categorize and block traffic and match traffic to firewall policies.
Availability
Deploys firewall(s) configured in sync to prevent network failure and provide business continuity.
Multi-Network Capability
Provides monitoring capabilities for multiple networks at once.
Anomaly Detection
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.
Network Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Scalability
Provides features to allow scaling for large organizations.
Automation (4)
Metadata Management
Indexes metadata descriptions for easier searching and enhanced insights
Artificial Intelligence & Machine Learning
Facilitates Artificial Intelligence (AI) or Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Continuous Analysis
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Incident Management (3)
Incident Logs
Information on each incident is stored in databases for user reference and analytics.
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Incident Reporting
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Management (5)
Network Automation
Automate how physical and virtual devices are configured, handled, tested, deployed, and operated inside a network.
Network Traffic Analyzer
Record and analyze the traffic on network.
User Provisioning
Ensure that only certain users have access to a system.
Network Analytics
Analyze network data to identify trends and patterns.
Resource Maintenance
Infrom user of upgrades and repairs to network resources.
Support (3)
Real-time alerting
Notify user when network related error arise.
Hybrid Infrastructure Support
Supports cloud and LAN, including hybrid infrastructure
API Integration
Provide API and custom sensors for easy integration.
Generative AI (3)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
Artificial Intelligence - Firewall (1)
AI Firewall
Utilizes AI to monitor network traffic, identify anomalies, and block attacks.
Agentic AI - Firewall Software (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience
Agentic AI - Network Management Tools (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Mobile Application Management (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives





