Security Products

Next-Generation Firewalls

Vendor Product Key Features
Check Point Check Point
Product Overview
Check Point
Quantum Force Security Gateway

チェック・ポイント アプライアンス
A next-generation firewall that consolidates comprehensive defenses against all forms of targeted cyberattacks and continuously evolves to address emerging threats.
Check Point
Quantum Spark Series

Check Point Quantum Spark Series
A next generation firewall tailored for SMB environments, delivering the same enterprise-grade security as the proven “Quantum Security Gateway”, refined through years of deployment in large-scale enterprise infrastructure.
Check Point
Quantum Smart-1

Check Point Quantum Smart-1
A purpose-built security management appliance designed to centrally managed and orchestrate Check Point gateways, ensuring consistent policy enforcement and operational efficiency at scale.
Check Point Quantum Maestro
Maestro
Welcome to the Future of Network Security Platforms. An industry-first hyperscale network security solution, implemented entirely on-premises.
Check Point
Software Blade

Software Blade
Security Licensing for Open Servers and Virtualized Environments.
Check Point
CloudGuard Network

CloudGuard Network
A Next-Generation Virtual Firewall Solution that deliveres consistent, enterprise grade protection across public and private clouds, using the same security architecture as on-premises gateways.

Targeted Attack Countermeasures

Vendor Product Key Features
Check Point Check Point
Product Overview
Check Point
Quantum Force Security Gateway

チェック・ポイント アプライアンス
A Next-generation threat prevention appliances that detect and block unknown malware leveraging virtual sandboxing and advanced threat sanitization technologies.
Check Point SandBlast
TE Appliances

Check Point SandBlast TE Appliances
A next-generation threat prevention appliance that detects and blocks unknown malware (virtual sandbox & content disarm and reconstruction solution).
Check Point
Quantum Spark Series

Check Point Quantum Spark Series
A next generation firewall tailored for SMB environments, delivering the same enterprise-grade security as the proven “Quantum Security Gateway”, refined through years of deployment in large-scale enterprise infrastructure.
Check Point Virtual Systems
Check Point Virtual Systems
Virtualized security gateway solution.
Check Point Quantum Maestro
Maestro
Welcome to the Future of Network Security Platforms. An industry-first hyperscale network security solution, implemented entirely on-premises.
Check Point
Software Blade

Software Blade
Security Licensing for Open Servers and Virtualized Environments.
Check Point
CloudGuard Network

CloudGuard Network
A Next-Generation Virtual Firewall Solution that deliveres consistent, enterprise grade protection across public and private clouds, using the same security architecture as on-premises gateways.
IRONSCALES IRONSCALES
IRONSCALES
A next-generation Business Email Compromise (BEC) protection solution leveraging machine learning and automated remediation at the mailbox level.

Cloud Security / Virtualization

Vendor Product Key Features
Check Point Check Point
Product Overview
Check Point
CloudGuard Network

CloudGuard Network
A Next-Generation Virtual Firewall Solution that deliveres consistent, enterprise grade protection across public and private clouds, using the same security architecture as on-premises gateways
Check Point Virtual Systems
Check Point Virtual Systems
Virtualized security gateway solution.
Trend Micro Deep Security
トレンドマイクロ
Next-generation host-based server security solution.

Mobile Endpoint Security Solution

Vendor Product Key Features
Check Point Check Point
Product Overview
Check Point
Harmony Mobile

Check Point Capsule
An integrated mobile security solution that delivers multi-layered protection against sophisticated mobile threats that MDM alone cannot address.
Check Point Check Point
Product Overview
Check Point
Harmony Endpoint

Check Point Harmony Endpoint
A next-generation endpoint security solution that protects both remote and on-premises devices and is highly effective against ransomware.
LayerX Security Ltd. SecureLayer Browser Extension
SecureLayer
A next-generation browser extension that strengthens browser security simply by being added as a plug-in.
Acronis Acronis Cyber Protect Cloud
Acronis
An integrated solution that combines backup and security capabilities with unified endpoint management.

Email Security

Vendor Product Key Features
Check Point Check Point
Product Overview
Check Point
Harmony Email & Collaboration

Harmony Email & Collaboration
An integrated security solution for cloud email, collaboration tools, and cloud storage services.
OrangeSoft BRODIAEA safeAttach
Orange Soft
Email mis-delivery protection solution.
IRONSCALES IRONSCALES
IRONSCALES
A next-generation Business Email Compromise (BEC) protection solution leveraging machine learning and automated remediation at the mailbox level.
Votiro Secure File Gateway
Votiro
SaaS-ready file sanitization solution that enables easy deployment of Votiro’s proven content disarm and reconstruction technology.
Disarmer
Votiro
File sanitization solution.
Acronis Acronis Cyber Protect Cloud
Acronis
An integrated solution that combines backup and security capabilities with unified endpoint management.

Phishing Protection (e.g., Business Email Compromise)

Vendor Product Key Features
Check Point Check Point
Product Overview
Check Point
Harmony Email & Collaboration

Harmony Email & Collaboration
An integrated security solution for cloud email, collaboration tools, and cloud storage services.
IRONSCALES IRONSCALES
IRONSCALES
A next-generation Business Email Compromise (BEC) protection solution leveraging machine learning and automated remediation at the mailbox level.

Application Security

Vendor Product Key Features
Digital.ai Application Protection
Digital.ai
An application protection solution that safeguards software against intellectual property theft and information leakage by hardening code against reverse engineering and related attacks.
Key & Data Protection
Digital.ai
A security solution that keeps cryptographic keys used by software hidden in system memory while still enabling encryption, decryption, and signing operations.

Server Security

Vendor Product Key Features
Trend Micro Deep Security
トレンドマイクロ
Next-generation host-based server security solution.

Sandbox

Vendor Product Key Features
Check Point Check Point
Product Overview
Check Point SandBlast
TE Appliances

Check Point SandBlast TE Appliances
A Next-generation threat prevention appliances that detect and block unknown malware leveraging virtual sandboxing and advanced threat sanitization technologies.

Malware Sanitization

Vendor Product Key Features
Check Point Check Point
Product Overview
Check Point SandBlast
TE Appliances

Check Point SandBlast TE Appliances
A Next-generation threat prevention appliances that detect and block unknown malware leveraging virtual sandboxing and advanced threat sanitization technologies.
Votiro Secure File Gateway
Votiro
SaaS-ready file sanitization solution that enables easy deployment of Votiro’s proven content disarm and reconstruction technology..
Disarmer
Votiro
File sanitization solution.

Log Analysis

Vendor Product Key Features
Hitachi
Solutions
NetInsight II
NetInsight II
A firewall log analysis tool.

Server Monitoring

Vendor Product Key Features
Micro Focus SiteScope
SiteScope
An gentless monitoring tool.

Encryption

Vendor Product Key Features
Digital.ai Key & Data Protection
Digital.ai
A security solution that keeps cryptographic keys used by software hidden in system memory while still enabling encryption, decryption, and signing operations.

Security Policy

Vendor Product Key Features
Asgent M@gicPolicyCoSMO
M@gicPolicyCoSMO
Information security management system (ISMS) designed to systematically manage and improve information security. tool.

Industrial Control systems (ICS) Security

Vendor Product Key Features
Check Point Check Point
Product Overview
Check Point
1570R Appliance

Check Point 1570R
Industrial Control System Security

Connected Car Security

Vendor Product Key Features
Digital.ai Application Protection
Digital.ai
An application protection solution that safeguards software against intellectual property theft and information leakage by hardening code against reverse engineering and related attacks.
Key & Data Protection
Digital.ai
A security solution that keeps cryptographic keys used by software hidden in system memory while still enabling encryption, decryption, and signing operations.
Karamba Security XGuard Integrity
Karamba
An autonomous security solution that protects connected cars and IoT devices against cyberattacks.
Karamba Security SafeCAN
Karamba
An ultra-lightweight network security solution for in-vehicle networks.
Karamba Security ThreatHive
Karamba
An early detection platform for ECU vulnerabilities.
Karamba Security Karamba's Total IoT Security
Karamba
Delivers end-to-end security across the entire lifecycle of IoT products, from development and testing through to operation.

WAAP

Vendor Product Key Features
Radware Cloud DDoS Protection Services
A cloud-based DDoS protection solution that shields organizations from all types of DDoS attacks using unique real-time signatures.
Radware Cloud Application Protection Services
A cloud-based WAAP solution that uses proprietary machine-learning algorithms to provide comprehensive protection, from zero-day attacks to API security.

Browser Security

Vendor Product Key Features
LayerX Security Ltd. SecureLayer Browser Extension
SecureLayer
A next-generation browser extension that strengthens browser security simply by being added as a plug-in.

Cloud Backup

Vendor Product Key Features
Acronis Acronis Cyber Protect Cloud
Acronis
An integrated solution that combines backup and security capabilities with unified endpoint management.

SASE

Vendor Product Key Features
Check Point Check Point
Product Overview
Check Point
Harmony SASE

A SASE solution that combines Secure Web Gateway (SWG) and Zero Trust Network Access (ZTNA) to deliver optimal user experience with strong network security.

Vulnerability Management

Vendor Product Key Features
Vicarius Vicarius VRX
Vicarius
A CTER solution that mitigates vulnerabilities even when corrective vendor patches are not yet available.