In addition to Capsule Cloud, it is recommended to enable personal firewall on protected computers in order to block undesired incoming connections from excluded and local networks. If you already deploy a Check Point Security Gateway, Cloud expands the number of blades available and offloads roaming user traffic to the cloud.Ĭheck Point Cloud tunnels the traffic initiated by the client to the cloud service. By tunneling all roaming user traffic to a firewall-in-the-cloud for security inspection, security is extended beyond the immediate enterprise. All traffic to and from the Internet is inspected for a variety of threats.Ĭloud helps enterprises protect roaming users (laptops) when they are outside the secured office environment. No further configuration is required by the employee. After installing the connector, the PC, or Mac is secured by a basic policy.Each employee receives an email with a link to download the Cloud Connector depending on the Operating system (PC, Mac).The designated system administrator registers to the Cloud Portal, and adds the email addresses of all the other employees.For example, a small company of ten employees may wish to protect its user's laptops. The Capsule cloud offers security as a service without the overhead of maintaining a physical gateway. The Check Point Cloud refers to a number of Check Point Security Gateways maintained at various locations around the world. Welcome to Check Point Capsule Cloud ( ).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |