Check Point Quantum Network Security

Check Point Quantum Network Security

Check Point Software Technologies
Kerio Control

Kerio Control

GFI Software
+
+

Related Products

  • ManageEngine Endpoint Central
    2,343 Ratings
    Visit Website
  • ThreatLocker
    491 Ratings
    Visit Website
  • Google Cloud Platform
    60,418 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,109 Ratings
    Visit Website
  • Fastly
    899 Ratings
    Visit Website
  • Kamatera
    151 Ratings
    Visit Website
  • SpamTitan
    814 Ratings
    Visit Website
  • Jscrambler
    32 Ratings
    Visit Website
  • Criminal IP
    13 Ratings
    Visit Website

About

Cyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT and remote users. Check Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN and IOT security to protect you against the most sophisticated cyber attacks. Delivers the highest-caliber threat prevention with award winning SandBlast Zero Day protection out of the box. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Integrating the most advanced threat prevention and a consolidated management, our security gateway appliances are designed to prevent any cyber attack, reduce complexity and lower your costs.

About

Detect threats, block viruses and secure VPN with the firewall built for SMB. Configure your firewall with easy-to-use traffic rules, controlling in- and outbound communications by URL, application, traffic type and more. Intrusion detection and prevention using the Snort system constantly monitors inbound and outbound network communications for suspicious activity. Log or block the communications depending on the severity. Prevent viruses, worms, Trojans and spyware from entering your network. Kerio Control goes beyond just checking files for malicious code; it scans your network traffic for potential attacks. Create secure, high-performance server-to-server connections between your offices running Kerio Control with an easy-to-setup VPN technology. Or, you can create a secure VPN connection to a remote office that doesn’t have Kerio Control deployed, using industry-standard VPN protocols.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a cyber threat solution

Audience

IT Professionals searching for a solution to detect threats

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$270 per year
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Check Point Software Technologies
Founded: 1993
United States
www.checkpoint.com/quantum/

Company Information

GFI Software
Founded: 1994
United States
www.gfi.com/products-and-solutions/network-security-solutions/keriocontrol

Alternatives

Alternatives

Sophos UTM

Sophos UTM

Sophos
Palo Alto Networks Strata

Palo Alto Networks Strata

Palo Alto Networks
VersaONE

VersaONE

Versa Networks

Categories

Categories

Firewall Features

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

Check Point Quantum Next Generation Firewalls (NGFW)
Check Point Quantum SD-WAN
Check Point Quantum Smart-1 Security
Check Point Quantum Spark
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
Quantum Firewall Software R82
Revelstoke
Vectra AI

Integrations

Check Point Quantum Next Generation Firewalls (NGFW)
Check Point Quantum SD-WAN
Check Point Quantum Smart-1 Security
Check Point Quantum Spark
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
Quantum Firewall Software R82
Revelstoke
Vectra AI
Claim Check Point Quantum Network Security and update features and information
Claim Check Point Quantum Network Security and update features and information
Claim Kerio Control and update features and information
Claim Kerio Control and update features and information