Check Point + Siemplify: Challenge
Check Point + Siemplify: Challenge
© 2020 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content | March, 2020 1
Check Point and Siemplify | Solution Brief
Value
Siemplify connects the security operations center with Check Point products to streamline every step of detection and response,
replacing manual processes with automated workflows that ensure optimized triage, investigation and containment.
Challenge
With endpoints proliferating across businesses, firewalls help control traffic based on actions configured within their policies.
Poorly implemented firewall rules can lead to major business risks. Standardizing these firewall policy actions across disparate
networks, processes and platforms poses a significant impediment for businesses with a large user population.
Solution
Playbooks running inside the Siemplify Security Operations Platform that are integrated with Check Point NGFW can be
scheduled to run at set intervals for firewall policy management. Operators can automate auditing and remediation, such as
activating a firewall rule, and workflows can tie into ticketing systems to notify administrators and track efforts.
Value
Optimizing firewall auditing and remediation to identify rules violations and analyze access policies can considerably reduce
firewall management, freeing up SOC analysts to concentrate on higher-order tasks
Firewall block lists need to be tight and precise to reduce false positives and security headaches. In Siemplify,
a common way to increase accuracy surrounding indicators of compromise (IOCs) is to leverage multiple
sources of threat intelligence to increase diversity of opinion and classification accuracy. But what when threat
intelligence does not have an answer?
Solution
The most abundant type of IOC is the file hash. Using advanced sandboxing technology, such as Check
Point’s Sandblast, the security team can take advantage of threat intelligence and sandboxing automatically
in a single pane of glass through Siemplify. The playbook queries SandBlast initially to see if the file already
has classification, and then if not, it detonates the file using the same integration, then finally pulls the result
and pushes it into their NGFW if it returns negative and has the option to triple check with additional sources
of threat intelligence.
Value
Through Siemplify, the security team gets the full power of Check Point SandBlast’s API to refine
intelligence surrounding files of questionable reputation, as well as the customizability of adding further
checks to 3rd party intelligence. They can automatically then maintain and update the IOC values of their
Check Point NGFW’s block lists. Additionally they can continue to automate their security processes in
Siemplify and proceed to automated remediation or other steps depending on the relevant security alert.
© 2020 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content | March, 2020 2
Check Point and Siemplify | Solution Brief
ABOUT SIEMPLIFY
Siemplify is the leading vendor-agnostic security operations platform globally, and is consistently chosen by world’s best security
teams, from Fortune 500 firms to global MSSPs, as their security platform of choice. Siemplify provides much more than
playbooks and automation. Based on years of expertise running and training military and civilian SOCs across the globe,
Siemplify has built a complete security operations platform that addresses the broadest set of SecOps needs. With built-in case
management, investigation, crisis management, collaboration, KPI tracking and a rich library of built-in knowledge – Siemplify is
a true workbench for analysts and engineers, and the SOC manager’s secret weapon to driving continuous improvement.
© 2020 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content | March, 2020 3