Professional Documents
Culture Documents
ABSOLUTE WITH
STEPS TO
ZERO TRUST
SECURITY
01
ZERO TRUST FOR NETWORKS
Prevent malicious lateral movement with CHECK POINT
SECURITY GATEWAYS
granular network segmentation Set and enforce a unified access
policy for users, devices, applications
and zones across all environments
Source
HR code
app
App
servers
Data CHECK POINT
Finance
app base APPLICATION CONTROL
Limit usage of ~8000 applications,
and features within them
OT
Single Sign On
(SSO) T IT Y Context Inspection
ID EN
01 03 CHECK POINT
• Device Identity IDENTITY AWARENESS
Seamless integration with a broad • Geo-Location Granting access to your data only to
range of third-party identity and CFO
• Time of connection authorized users, and only after their
Multi-Factor Authentication service
identities have been strictly
ID E N TITY CO
Multi Factor
IR M
Authentication
AT
IO
02 04
• Multiple unsuccessful login attempts
• Unrecognized device
• Unusual time and location
• And more…
NETWORK-BASED THREAT
PREVENTION
• Threat emulation
• Threat extraction
• Anti-virus
• Anti-bot
EMPLOYEES’ INDUSTRIAL MEDICAL SMART BUILDING SMART OFFICE • IPS
ENDPOINTS CONTROL SYSTEMS DEVICES DEVICES DEVICES
VM TM
05
ZERO TRUST DATA
Classify, protect and encrypt your data,
wherever it is
06
VISIBILITY & ANALYTICS
Quickly detect and mitigate threats
with a single view into security risks
Identify suspicious activity and track trends Real-time visibility into billions of log records
Asset and workload discovery in cloud-based data Incident response (IR) ticket enrichment
centers (IaaS) and virtualization
Dynamic update of objects and policy rules Automation of security operational tasks
08
THREAT PREVENTION
Protect from known and unknown threats
• Intrusion prevention
• CPU-level inspection
• Anti-bot
• Malware DNA
• Anti-virus
• Threat emulation
• URL filtering
• Threat extraction (CDR)
• URL reputation
• Campaign hunting (AI)
• IP reputation
• Context aware detection (AI)
• Domain reputation
• Huntress (AI)
• Anti phishing
• Zero-phishing
• Identity awareness
• Anti-ransomware
• DDoS
Emulates more than 4 Stops 7,000 zero-day Passes 86 billion IOCs • Account takeover
million files per day attacks per day per day • Malware evasion resistance
UNIFIED POLICY
Learn more about Absolute Zero Trust with Check Point Infinity
Checkpoint.com/solutions/Zero-Trust-Security