Extensive and Dynamic URL Coverage
Utilize a dynamically updated database of over 100 Million Websites to allow, block or limit web site access in real-time—all web site traffic, clear and SSL-encrypted. Choose from 64 pre-defined content categories.
- Dynamically allow, block or limit access to over 100 million Websites
- Analyze SSL-encrypted traffic
- Create policy rules using 64 pre-configured categories
- Control access to complete sites or just pages within a site
- Fine tune policies with white listing and black listing of specific URLs
Complete Web Control With Application Control Integration
Combine the URL Filtering Software Blade and the Application Control Software Blade to unify web site access control with web application and widget control for improved security and lower cost.
The Check Point URL Filtering Software Blade provides the ability to allow, block or limit access to millions of web sites and web pages. Check Point Application Control Software Blades provides similar capabilities for 4,500 internet applications and over 225,000 web-based widgets.Check Point unifies URL Filtering and Application Control deliver:
- One common rule-base to simplify policy creation with joint categories for both websites and applications
- One management console for easier management
- One reporting system for improved visibility into web events.

Combining URL Filtering and Application Control Rules
Inspect SSL Encrypted Traffic
Scan and secure SSL encrypted traffic passing through the gateway.
When traffic is passing through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver.Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy. Some encrypted content passing through the gateway should not be inspected, and therefore can be bypassed with a simple administrator policy definition.
Engage and Educate Users with Integrated Check Point UserCheck
Use Check Point UserCheck to actively engage and educate users as they access the web to identity potential policy incidents as they occur and remediate them immediately.
Users are an integral part of the web security and control process. The best practice is to engage and educate users as they use the web to identity potential policy incidents as they occur and remediate them immediately. Check Point UserCheck, a feature of the URL Filtering software blade, enables an organization to implement this best practice saving valuable IT administration time while improving user productivity and overall security.

Engage and Educate Web Users with UserCheck
User, Group and Machine Aware
Allow, block or limit web site access based on user, group and even machine-id for a single URL or an entire URL Category.

The ability to allow, block and limit web site access based on user, group and even machine-id is missing from most URL filtering solutions today. Check Point URL Filtering is user-aware making user, group and machine-id information readily available for policies, reporting and management purposes.

User Awareness in URL Filtering Events
360° Visibility and Reporting
Achieve an unmatched level of visibility into web related security events to not only detect web access security events, but also prevent them.
Protecting an organization from dangerous, malicious or unproductive web sites is one aspect of URL Filtering. But, without visibility into web access security events, an organization increases its security risk while potentially impacting network performance and productivity.Check Point URL Filtering seamlessly integrates with SmartEvent Software Blade to provide an unmatched level of visibility into web related security events. This enables Check Point to prevent web access related security events rather than just detecting them or worse missing them altogether.

Consolidated URL Filtering and Application Control Events
Integrated into Check Point Software Blade Architecture
The URL Filtering Software Blade is integrated into the Software Blade Architecture, and can be activated easily on Check Point security Gateways. By just enabling the URL Filtering software blade inside their existing gateways, companies can save up to 90% over traditional stand-alone URL Filtering solutions.
Fully integrated into Check Point Gateways
URL Filtering is fully integrated into Check Point gateways
- Eliminates bypass through external proxies
- Enforces inspection of all traffic
- Protects when traversing non-standard ports
- Improves TCO by managing and maintaining security on one machine
Enterprise Class URL Filtering solution
- Scales up to 7 Gbps throughput
- Achieve up to 500,000 concurrent sessions
- High availability clustering
|