Checkpoint Webapp Protector Datasheet
Checkpoint Webapp Protector Datasheet
Checkpoint Webapp Protector Datasheet
By targeting the application layer, attackers exhaust server and application resources
using stealth attack techniques that go undetected by traditional security tools. It is
Fast to Deploy
no longer just about http floods and downtime. Advanced methods and the use of
Fast, reliable, and secure delivery of multiple vectors during attacks present new challenges in securing an organization.
mission-critical web applications
© 2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content 1
July 15, 2019
Web App Protector | Datasheet
By using both negative and positive security models - Web App Protector features not only the lowest false positives and minimal
operational effort, but also robust protection against known and unknown (Zero -day) threats.
The Auto Policy Generation module will automatically use the required security filter, create security filter rules and switch the
security filters into active mode. These operations would normally require many manual refinements.
By leveraging machine-learning algorithms, Auto Policy Generation is designed to secure a web application as automatically as
possible with little or limited user interaction and offers the following benefits:
Shortest time to protection, requiring only one week for known attacks – 50% faster than other leading WAFs
Best security coverage by performing auto threat analysis, with no admin intervention – covering over 150 attack vectors
Lowest false-positives achieved through auto-optimization of out-of-the-box rules – close to zero false positives
Automatic detection of web application changes assuring security throughout the appl ication’s development lifecycle – post
deployment peace of mind
© 2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content | July 15, 2019 2
Web App Protector | Datasheet
As Web applications are continuously introducing new features and resources, Check Point’s Web App Protector automatically
detects any changes in the Web applications (1) in real time and invokes (2) DAST tool to explicitly scan (3) the specific
application zones that have been changed. This scan is accomplished in minutes versus a complete web application scan that
can take hours. Web App Protector then reads (4) the DAST vulnerability report, and uses it to automatically update the
application security policy (5) by creating the applicable virtual patches. Following that, a second vulnerability scan is in voked to
test whether the application security was indeed successfully patched.
Once Web App Protector detects a web-based attack, it automatically sends a message to DDoS Protector which is deployed at
the perimeter to mitigate and block attacks in real-time.
This unique defense messaging mechanism can be leveraged when Web App Protector is deployed inline as well as out-of-path
to assure line speed web based attack mitigation with no additional latency, performance impact or risk. This includes:
Mitigating at line speed– up to 400 Gbps, 330M DDoS PPS at 60 micro-seconds latency.
Mitigating cyber-attacks targeting web applications behind CDNs.
Blocking advanced HTTP DDoS attacks (Slowloris, Http Dynamic Floods), Brute Force attacks on login pages and SSL
based attacks.
Blocking the attack source at the perimeter, before it enters the organizations’ network, securing ot her applications and
services.
Enabling multi-layered detection and mitigation
© 2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content | July 15, 2019 3
Web App Protector | Datasheet
Authentication Gateway
Web App Protector’s user authentication and single sign-on offering functions as an authentication tier in front of the web
applications. It applies two factor authentication, authorizes and enforces . Web Access Control policy, and enables access to
premise-based applications from outside the enterprise network. Various authentication schemes are supported among of which
are the FBA (Form Based Authentication), NTLM, and KCD (Kerberos Constrained Delegation).
Compliance
Web App Protector enables organizations to fully comply with PCI DSS section 6.6 requirements and includes the most
advanced security graphical reports to convey visibility into the application security and detec ted attacks. Its detailed PCI
compliance report analyzes the security policies, provides automatic compliance status and a mandatory action plan for
compliance.
© 2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content | July 15, 2019 4
Web App Protector | Datasheet
© 2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content | July 15, 2019 5
Web App Protector | Datasheet
Worldwide Headquarters | 5 Shlomo Kaplan Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@checkpoint.com
CONTACT US
U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-628-2117 | www.checkpoint.com
© 2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content 6
July 15, 2019