0% found this document useful (0 votes)
88 views8 pages

Check Point Integrated Security Architecture - Brochure

Uploaded by

Luis Rodrigues
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views8 pages

Check Point Integrated Security Architecture - Brochure

Uploaded by

Luis Rodrigues
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Check Point Integrated Security Architecture | Brochure

INTEGRATED
SECURITY
ARCHITECTURE

2021
©2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] | April 20, 2021 | Page 1
Check Point Integrated Security Architecture | Brochure

TODAY’S SECURITY CHALLENGE INTEGRATED SECURITY ARCHITECTURE


Protecting enterprises against today’s constantly evolving Regardless of your organization’s size, you must be secure to
threats has never been more challenging. Infrastructure, compete. Check Point delivers the best security solutions with
connectivity and performance requirements keep growing. the right architecture to prevent attacks in all of your
New and varied threats are leading to more security vendors, environments. The Check Point integrated security
point products and complexity, while IT teams are under architecture allows companies to enforce security policies
increasing pressure to reduce costs and complexity, and do while helping to educate users on those policies. We deliver
more with existing hardware and resources. The combination total, flexible and manageable security to companies of any
of these challenges has led to ineffective approaches that are size and to any platform.
increasingly inefficient, costly and unsustainable.

As a result, organizations and IT teams are looking for a


THE SOFTWARE SECURITY ADVANTAGE
better solution — one that is more simple, flexible and
Security applications or modules such as a firewall, Virtual
secures the entire enterprise. This includes the freedom to
Private Network (VPN), Intrusion Prevention System (IPS), or
add critical protection at the network or endpoint as needed,
Application Control to name a few, are fully integrated and
without worrying about performance, availability or forklift
centrally managed. They allow organizations to customize a
upgrades. It also means the ability to invest in security only as
security configuration that targets the right mix of protection
you need it, without having to introduce yet another security
and investment. Security delivered as software can be quickly
vendor, endpoint agent, or point appliance.
enabled and configured on any gateway or management
system with a simple click of a mouse — no hardware,
NETWORK, CLOUD AND MOBILE firmware or driver upgrades are required. And as needs
SECURITY evolve, additional security can be easily activated to extend
security to an existing configuration on the same security
hardware.
Since 1993, Check Point has been dedicated to providing
customers with uncompromised protection against all types
of threats, reducing security complexity and lowering total ALL INCLUSIVE SECURITY PACKAGES
cost of ownership. We are committed to staying focused on
customer needs and developing solutions that redefine the To simplify your experience as a customer we offer inclusive
security landscape today and in the future. next generation security and management packages.
Gateways and endpoints come with SandBlast Zero-day
Our products provide end-to-end security from the enterprise Threat Prevention. Renewal packages such as Next
to the cloud to your mobile worker’s personal devices. We Generation Firewall are available at the end of the first year.
prevent and mitigate cyber-attacks and limit the data theft Our security management package combines policy
that often results from these threats. Our unified security management, monitoring and event management in one
management solution delivers unsurpassed extensibility and platform.
ease of use.

UNIFIED SIMPLE

©2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] | April 20, 2021 | Page 2
Check Point Integrated Security Architecture | Brochure

KEY BENEFITS
BETTER SECURITY

A multi-layered solution p r o v i d e s end-to-end security from the enterprise to the


cloud to your mobile worker’s personal devices, combined with the industry’s most
advanced threat prevention capabilities.

SIMPLICITY
Easy administration, total flexibility and simple security activation eliminates
complexity and makes security easier to operate and manage.

MANAGEABILITY
One-click activation enables fast deployment of security services. Centralized
security management increases productivity and efficiency.

TOTAL SECURITY
A comprehensive library of fully integrated security delivers unrivaled security
integration to allow the right level of security at all layers of the network.

LOWER TCO
Delivers better security, hardware extensibility and consolidation, while lowering TCO
compared with traditional multi-vendor solutions.

COMPREHENSIVE VISIBILITY
Threat management is fully integrated, with logging, monitoring, event correlation
and reporting in one place. The intuitive, visual dashboard provides full visibility into
security across the network, helping you monitor security continuously and stay alert
to potential threats.

LOWER CARBON FOOTPRINT


Deliver green IT savings by allowing the consolidation of multiple point solutions into
one integrated gateway that reduces rack space, cooling, cabling and power.

©2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] | April 20, 2021 | Page 3
Check Point Integrated Security Architecture | Brochure

EXTEND YOUR SECURITY SOLUTION WITH A


CLICK OF A MOUSE. EASILY ADD NEW
SECURITY WITH CHECK POINT’S FLEXIBLE,
EASY-TO-USE MANAGEMENT CONSOLE.

HOW IS CHECK POINT SECURITY DEPLOYED?


Security can be deployed on Check Point appliances and open servers. New security functions can be easily added to
your existing hardware platform by simply “turning on” the functionality in the Check Point centralized, easy-to-use
management console. No additional hardware, firmware or drivers are necessary. This enables organizations to
deploy security dynamically — as needed — with lower total cost of deployment.

©2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] | April 20, 2021 | Page 4
Check Point Integrated Security Architecture | Brochure

NETWORK SECURITY

The Check Point Firewall builds on the award-winning technology first offered in Check Point’s FireWall-1 solution
to provide the industry’s strongest level of gateway security and identity awareness.

Check Point IPsec VPN integrates access control, authentication and encryption to guarantee secure connectivity
to corporate networks for remote and mobile users, branch offices and business partners over the Internet.

Check Point Advanced Networking and Clustering simplifies network security deployment and management within
complex networks, while maximizing network performance — ideal for high-end enterprise and datacenter
environments where performance and availability are critical.

Check Point Mobile Access provides simple and secure remote access to email, calendars, contacts and corporate
applications over the Internet, via smartphones, tablets or laptops.

Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched
application and access control through the creation of accurate, identity based policies.

Check Point Application Control enables IT teams to easily create granular policies — based on users or groups —
to identify, block or limit usage of over 8,500 applications.

Check Point URL Filtering integrates Secure Web Gateway controls with NGFW Application Controls, allowing
unified enforcement and management of all aspects of Web security.

Check Point Content Awareness is a light-weight Data Loss Prevention (DLP) solution that helps businesses to
pre-emptively protect sensitive information from unintentional loss, educating users on proper data handling
policies and empowering them to remediate incidents in real-time.

Check Point Intrusion Prevention System (IPS) delivers complete and proactive intrusion prevention — all with the
deployment and management advantages of a unified and extensible next-generation firewall solution.

Check Point Anti-Bot detects bot-infected machines, prevents bot damages by blocking bot C&C communications,
and is continually updated from ThreatCloud™, the first collaborative network to fight cybercrime.

Check Point Antivirus stops incoming malicious files. Using real-time virus signatures and anomaly-based
protections from ThreatCloud™, the first collaborative network to fight cybercrime.

Check Point Anti-Spam and Email Security provides comprehensive protection for an organization's messaging
infrastructure.

Check Point SandBlast Threat Emulation prevents infections from zero-day threats, new malware and targeted
attacks. As part of the SandBlast™ Zero-Day Protection solution, this innovative sandboxing engine delivers the
best possible catch rate for threats, and is virtually immune to attackers’ evasion techniques.

©2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] | April 20, 2021 | Page 5
Check Point Integrated Security Architecture | Brochure

The Check Point SandBlast Threat Extraction removes exploitable content, including active content and embedded
objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to
maintain business flow.

MANAGEMENT

Check Point Network Policy Management provides comprehensive, centralized network security policy
management for Check Point gateways via a single, unified console that provides control over the most complex
security deployments.

Check Point Endpoint Policy Management simplifies endpoint security management by unifying all endpoint
security capabilities for PC & Mac in a single console. Monitor, manage, educate and enforce policy, from an at-a-
glance dashboard down to user and machine details, all with a few clicks.

Check Point Next-Generation SmartEvent consolidates monitoring, logging, reporting and event analysis in a
single console—to bring you comprehensive, easy-to-understand threat visibility. So, rather than drown in the
deluge of data, your security team can focus their efforts on the critical threats.

Check Point Logging and Status transforms data into security intelligence with SmartLog, an advanced log
analyzer that delivers split-second search results providing real-time visibility into billions of log records over
multiple time periods and domains.

Check Point Compliance provides an integrated and fully automated security and compliance monitoring solution.
Compliance enables continuous monitoring, strengthens regulatory compliance, maintains secure policy, and
reduces audit time & costs.

Check Point SmartProvisioning provides centralized administration and security provisioning of Check Point
devices. Using profiles, administrators can automate device configuration and easily roll out changes to settings to
multiple, geographically distributed devices, via a single security management console.

Check Point Monitoring presents a complete picture of network and security performance, enabling fast responses
to changes in traffic patterns or security events. Monitor Check Point devices and alerts to changes to gateways,
endpoints, tunnels, remote users and security activities.

Check Point SmartView allows browser-based event management. Use the SmartView Web Application to see an
overview of the security information for your environment. It has the same real-time event monitoring and analysis
views as SmartConsole.

Check Point User Directory leverages LDAP servers to obtain identification and security information about network
users, eliminating the risks associated with manually maintaining and synchronizing redundant data stores, and
enabling centralized user management throughout the enterprise.

©2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] | April 20, 2021 | Page 6
Check Point Integrated Security Architecture | Brochure

ENDPOINT SECURITY

Check Point Full Disk Encryption provides automatic security for all information on endpoint hard drives, including
user data, operating system files and temporary and erased files. For maximum data protection multi-factor pre-
boot authentication ensures user identity, while encryption prevents data loss from theft.

Check Point Media Encryption and Port Protection provides centrally-enforceable encryption of removable storage
media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Port control
enables management of all endpoint ports, plus centralized logging of port activity for auditing and compliance

Check Point Capsule Docs controls your business documents, regardless of where they go. Encrypt your business
documents and enable seamless access by authorized users only.

Check Point Firewall & Compliance Check protects endpoints by controlling inbound and outbound traffic and
ensuring policy compliance, with centralized management from a single console.

Check Point Remote Access VPN provides users with secure, seamless access to corporate networks and
resources when traveling or working remotely.

Check Point Anti-Malware efficiently detects and removes malware from endpoints with a single scan. Viruses,
spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic
analysis.

SandBlast Agent Threat Forensics identifies and mitigates threats before significant damage is done by monitoring
files and the registry for suspicious processes and network activity.

Check Point Endpoint Anti-Bot prevents damage at the endpoint by blocking bot communication to Command &
Control (C&C) sites, securing sensitive information from being stolen or sent out of the organization.

The Check Point SandBlast Agent browser extension defends endpoints and web browsers with a complete set of
real-time advanced browser and endpoint protection technologies, including Threat Emulation, Threat Extraction,
Anti-Bot, Zero Phishing™ and Automated Incident Analysis.

©2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] | April 20, 2021 | Page 7
Check Point Integrated Security Architecture | Brochure

Contact Check Point Now

www.checkpoint.com/about-us/contact-us

By phone in the US: 1-800-429-4391

1-650-628-2000

©2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] | April 20, 2021 | Page 8

You might also like