Check Point Capsule Cloud solves security dilemmas by using a cloud based security container to enforce your in-network security policy on laptops used outside of the corporate network. It delivers the protection of Check Point Software Blades using a cloud-based service, leveraging real-time protection against threats with ThreatCloud.
- Single policy for on premise and off premise laptops
- Single policy for on premise and off premise laptops
£1.08 per person per month
- Education pricing available
Phoenix Software Ltd
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||Currently only supports Windows and IOS laptops/machines|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Yes, Standard Support Customers have an SLA of 4 Hours for Severity 2,3,4 Questions and 30 Minutes for Severity 1 Questions.
Yes, Premium Support Customers have an SLA of 4 Hours for Severity 3,4 Questions, 2 Hours for Severity 2 and 30 Minutes for Severity 1 Questions.
Yes, Elite Support Customers have an SLA of 4 hours for Severity 3,4 Questions and 30 minutes for Severity 1,2 Questions .
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Customers can log into Check Point Web Chat via www.checkpoint.com, Then they would click support, support center and the underneath "Get Help" select Live Chat.|
|Web chat accessibility testing||None|
|Onsite support||Yes, at extra cost|
Check Point Standard Support: SLA 9x5 Buisness Day. Response Time Severity 1: 30 Minutes, Severity 2,3,4 4 Hours. Latest hotfixes yes, Major Upgrades and Enhancements Yes.
Check Point Premium Support: SLA 7 x 24 Every Day. Response Time Severity 1: 30 Minutes, Severity 2,2 Hours and Severity 3 & 4 4 Hours. Latest hotfixes yes, Major Upgrades and Enhancements Yes.
Check Point Elite Support: SLA 7 x 24 Every Day. On Site Engineer for Critcal SRs Response Time Severity 1: 30 Minutes, Severity 2 30 minutes and Severity 3 & 4 4 Hours. Latest hotfixes yes, Major Upgrades and Enhancements Yes.
Check Point Diamond Support: SLA 7 x 24 Every Day. Designated Diamond Engineer Response Time Severity 1: 30 Minutes, Severity 2,3,4 based on level of support(Standard, Premium or Elite. Latest hotfixes yes, Major Upgrades and Enhancements Yes.
|Support available to third parties||Yes|
Onboarding and offboarding
When you access the Cloud Portal for the first time, you must create a new account in the Create
New Account area:
1. Enter a valid email address.
2. Enter a password you will use to log into the Cloud Portal.
3. Confirm the password.
4. Click Sign Up.
5. A confirmation email is sent to the address specified in step 1. Click Activate Account in the email.
The Cloud Portal opens in your browser and you can log in.
|End-of-contract data extraction||It cannot be, it is securely erased|
|End-of-contract process||We securely erase your domain and restrict access to your portal, the encrypted portion of the cloud drives is unencrypted and opened back up. The original SaaS solution returns to normal|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||If run as a standalone setup, access is available via the web interface from a URL that can be linked to your domain. It is also possible to register the cloud gateway as a standard device in an existing Check Point management appliance and utilise the same policy and logging as per the rest of the estate.|
|Accessibility testing||Don't know|
|What users can and can't do using the API||Don't know|
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||Users can customise the policy and security blades which are enforced to end/remote users. Web UI can be skinned and customised, and it is possible to interface via API|
|Independence of resources||The service is cloud hosted, therefore all backend resources are scalable to meet demand.|
|Service usage metrics||No|
|Supplier type||Reseller providing extra support|
|Organisation whose services are being resold||Check Point Software Technologies|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||No|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||They can export the policy that has been created, logs are also accesible via the cloud portal or can be sent to an on prem manager.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||
|Other protection within supplier network||Encryption|
Availability and resilience
There are two aspects of system availability:
1. Network uptime intent
- CP strives to provide service uptime that is equal or greater than 99.999% calculated per calendar month.
- System availability is calculated as ratio of total expected uptime per month minus reported downtime, with the exceptions for the below-excused outages.
Note that uptime is not guaranteed or subject to credits.
- To insure latency that is less than 100ms.
- Measured between CC serving gateway and the end user.
Note that content download from the original content server is not included in the latency measurement.
|Approach to resilience||Cloud based infrastructure has physical resiliency, scaling and geographical resiliency built in.|
|Outage reporting||Yes, via https://status.checkpoint.com|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Only the administrators will know the URL to access the management pane, and can restrict what users have access / logins to it. This is the same if managed centrally via the Smart Daashboard.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||BSI|
|ISO/IEC 27001 accreditation date||21/01/2016|
|What the ISO/IEC 27001 doesn’t cover||N/A|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||ISO 27001|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Supplier-defined controls|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Supplier-defined controls|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Supplier-defined controls|
|Incident management type||Supplier-defined controls|
|Incident management approach||Supplier-defined controls|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£1.08 per person per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||Interested parties can reach out to Check Point directly or via a supplier to initiate a free trial, from this free trial you will be able to integrate 25 users for up to 30 days.|
|Link to free trial||This needs to be carried individually, if you can reach out to the UK office at the following page - https://www.checkpoint.com/about-us/contact-us/ or speak directly to your account manager / resller.|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|