Competitive Factsheet How to Win With Check Point Capsule Cloud Product Summary How Our Solution Is Unique Extend corporate security policy to mobile devices n Apply a single policy for the entire organization n Protect mobile users outside the enterprise security perimeter n All logs are streamed to SmartCenter for out of the box log consolidation Protect Mobile Devices From Threats Everywhere Check Point Capsule Cloud Extend corporate security to mobile devices Protect mobile devices from bot damages and malicious content Protect mobile devices from bot damage and malicious content n Deliver the protection of Check Point Software Blades using a cloud-based service n Leverage real-time protection against threats with updates from ThreatCloud n Protect the user device, corporate data, and the network from risk Understanding Capsule Cloud How is device communication secured? Check Point Capsule Cloud secures device communication by tunnelling all traffic to the nearest cloud gateway. How is traffic secured? At the gateway the traffic is scanned by Check Point Software Blades and checked against the corporate security policy. What Software Blades are included in the service? Check Point Capsule Cloud includes: Antivirus, Anti-Bot, Application Control, URL Filtering, IPSec VPN, IPS and Threat Emulation. What happens if a threat or violation is detected? If the cloud service detects a threat or policy violation, the traffic will be blocked, and the user will be alerted to the issue with a Check Point User Check message. n All traffic is routed through a secure tunnel n Complete solution with URL Filtering, Application Control, Anti-Bot, Antivirus, Threat Emulation and IPS n Always on, and always connected in any location Seamless use and management n Transparent and borderless user experience n Self-configuring client n Easily manage via SmartCenter or simple web UI n Requires no management infrastructure How to Compete Against… Competitor Protect ALL mobile device traffic Weaknesses Complex architecture—with multiple sets of configuration & UI’s Partial Active Directory integration—without sync option n Limited forensics—no real-time logging and limited reporting n Limited direct-to-cloud VPN—lack of direct to cloud support for mobile device n n (phone & tablets) n No hybrid management—separate policy for on-premise devices (IronPort, ASA) n Proxy based solution—less secure and can be bypassed Poor malware database—only ~15,000 threats in Zscaler Threat Library in n Policy administration overhead—time consuming deployment with more than n comparison to ~70M threats in Check Point ThreatWiki 20 policy types n Partial security—limited threat prevention in the cloud with no IPS and n MDM component purchase required—in order to deploy their cloud solution Sandbox capabilities on mobile devices Limited client control—no control of user settings from cloud portal management n n MDM component purchase required—in order to deploy their cloud solution on mobile devices Complex configuration—limited visibility of cloud policy n Limited forensics—no real-time logging and limited reporting n ©2014 Check Point Software Technologies Ltd. All rights reserved. October 20, 2014 [Confidential]—For Check Point users and approved third parties Competitive Factsheet How to Win With Check Point Capsule Cloud Cisco Claim: Using Cloud Web Security, employees with mobile devices can securely connect directly to the Internet through the nearest cloud proxy. Check Point Zscaler Cisco Blue Coat Websense Application Control 4 74 4 74 74 REALITY Today, employees with mobile devices have to use a non-secure proxy or implement a VPN tunnel to the cloud through the corporate gateway in order to connect to Cloud Web Security. URL Filtering 4 4 4 4 4 IPS 4 74 4 7 7 Cisco Anti-Bot 4 74 74 74 74 Anti-Virus 4 4 4 4 4 Threat Emulation (Sandbox) 4 74 74 7 4 DLP 4 4 7 7 4 No direct-to-cloud VPN for mobile devices. All mobile device traffic is routed to the cloud via the corporate headquarters, which introduce s bandwidth limitations and poor user experience due to latency n On premise appliance is needed (at an extra cost) to route mobile traffic to the cloud n Check Point Direct VPN tunnel to the cloud. Complete protection for all traffic from any mobile device (laptops, smartphones and tablets) n Protects any mobile platform (Windows, Mac OSX, iOS and Android) n Easy client deployment and installation using Email, URL or QR code n Zscaler Claim: Zscaler’s Advanced Security Suite protects organizations from advanced threats REALITY Zscaler’s malware database is no match to Check Point’s extensive Threat Prevention database Zscaler According to Gartner, “Zscaler has only a limited number of dedicated malware researchers” n Limited threat database with information on only 200 viruses and spyware and ~15,000 advanced threats n Approximately 130 apps in application control n Check Point Mobile users are protected everywhere with industry leading, NSS recommended and award winning NGFW and NGTP solutions n Threat database of over 70 million searchable protections through Check Point ThreatWiki n More then 5700 apps in application database n Ability to scan port evasive applications (e.g. Proxy avoidance, anonymizer, etc.) n Blue Coat Claim: Web Security Service protects web traffic routed from various access methods Email Security (Mail Transfer Agent) H1 2015 4 4 7 4 ThreatCloud Services 4 74 74 74 74 On-Premise Management 4 7 7 7 4 Pre-Defined Policy 4 7 7 4 7 Active Directory Synchronization 4 4 74 4 4 Auto Client Deployment 4 7 7 7 4 Mobile Client (iOS/Android) 4 74 74 4 4 Encrypted Branch Connectivity 4 4 7 4 7 Proxy-to-Cloud H1 2015 4 4 4 4 Real-Time Logging 4 4 7 4 7 In-House Event Analysis 4 7 7 7 7 Reality Blue Coat Web Security Service requires two solutions for protecting desktop and mobile users Blue Coat Blue Coat lacks a unified solution for all devices—requires a separate solution for desktop OS (Windows/MAC) and for mobile OS (iOS/Android). n Smartphone/tablets mobile users can connect to Blue Coat cloud only via “Mobile Device Security Service “(MDS) which is Blue Coat’s MDM solution that must be purchased at an extra cost n Check Point Capsule Cloud is a unified solution for any type of mobile device (desktop, laptops, smartphones and tablets) n Identical solution for all devices n User can choose which type of device to register to the cloud (Windows/Mac/iOS/Android) n Consistent and unified cost for all devices n Websense Claim: WebSense Cloud policy is a simple to use solution to protect and control employee web access Reality Websense’s policy configuration is cumbersome and complex Websense Requires administrators to manage categories and exceptions instead of user access n Limited visibility of cloud policy and users, which can lead to security policy errors n Limited number of applications (~160 ) n Lacks capability of real -time logging of user activity n ©2014 Check Point Software Technologies Ltd. All rights reserved. October 20, 2014 Questions to Ask Check Point Check Point Simple, intuitive and easy to manage application & URL filtering policy n Create an application and URL filtering policy in just a few clicks (Basic Mode) or configure granular policy rules (Advanced Mode) n Single policy for on premise & cloud. Manage enterprise level cloud policy via SmartDashboard n More then 5700 apps in application database n Real-time visibility of cloud activity using SmartLog view with split-second ‘Google like’ search from any log field n Security/Network Administrators n How do you enforce security policies on mobile devices outside of the enterprise security perimeter? n How do you deploy a mobile security solution while maintaining a single security policy for both office and mobile users? n What are the benefits of a flexible cloud solution with on premise management and logging? Management (CIO, CTO) n How do you currently secure mobile devices from malware and threats? n How do you provide the same on premise protection for your mobile users and devices? n How can you secure branch offices with the same level of security as your headquarters and without any infrastructure changes? Finance (CFO, Purchasing) n What is the organizational impact of a cloud based solution with the best pure OPEX model and no additional hidden costs? n What benefit would you gain from a single solution addressing all your mobile security needs with a low per user TCO? [Confidential]—For Check Point users and approved third parties
© Copyright 2026 Paperzz