Professional Documents
Culture Documents
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 2
Agenda
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 3
Check Point Architecture
1. Smart Console
3. Security Gateway
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 4
Stand-Alone Installation
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 5
Distributed Installation
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 6
Smart Console
• Smart Dashboard
• Smart View Tracker
• Smart View Monitor
• Smart Event
• Smart Update
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 7
Smart Dashboard
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 8
Log Collection and Tracking Process
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 9
Smart View Tracker
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 11
Smart Event
Timelines – See real time information, trends, and anomalies at a glance.
User Identification – Every log can be associated with Active Directory user names.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 12
Monitor Only what is Important!
Timeline view
Number and
severity of attacks
Monitor what is
over time
Simple mouse- Important
click drill down to
forensic analysis
Customizable –
Recent critical events
allows user to
define his own
timelines
Recent
critical events
At-a-glance view
of recent Timeline view
critical events
Simple mouse-
click drill down to
forensic analysis
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 14
View Event Statistics with over 25 Charts
On-Line Charts
Can be viewed by
different criteria
such as:
Severity
Event Name,
Source,
Destination
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 15
SmartEvent DLP Support
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 16
Smart Update
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 17
Agenda
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 18
Our new security architecture
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 20
Security Gateway Blades
Firewall World's most proven firewall secures more than 200 applications, protocols and services featuring the
most adaptive and intelligent inspection technology.
IPsec VPN Secure connectivity for offices and end users via sophisticated but easy to manage Site-to-Site VPN
and flexible remote access.
IPS The highest performing integrated IPS solution with the industry's best threat coverage
Web Security Advanced protection for the entire Web environment featuring the strongest protection against
buffer-overflow attacks.
URL Filtering Best-of-breed Web filtering covering more than 20 million URLs protects users and enterprises by
restricting access to dangerous Web sites.
Antivirus & Anti-Malware Leading antivirus protection including heuristic virus analysis stops viruses, worms
and other malware at the gateway
Anti-Spam & Email Security Multi-dimensional protection for the messaging infrastructure stops spam, protects
servers and eliminates attacks through email.
Advanced Networking Adds dynamic routing, multicast support and Quality of Service (QOS) to security
gateways.
Acceleration and Clustering Patented SecureXL and ClusterXL technologies provide wire speed packet
inspection, high availability and load sharing.
Voice over IP Advanced connectivity and security features for VoIP deployments, featuring enhanced Rate
Limiting protections, Far end NAT and inspection of SIP TLS.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 21
[Restricted] ONLY for designated groups and 22
Event Correlation
Reporting
SmartWorkflow
SmartProvisioning
Security Management Blades
|
©2010 Check Point Software Technologies Ltd.
Complete Security & Management Portfolio
User Directory
Management Portal
Monitoring
Total Security
Network Policy Management Comprehensive network security policy management for Check Point gateways and blades via Smart Dashboard, a
single, unified console
Endpoint Policy Management Centrally deploy, manage, monitor and enforce security policy for all endpoint devices across any sized
organization.
Monitoring A complete view of network and security performance, enabling fast response to changes in traffic patterns and security events.
Management Portal Extends a browser-based view of security policies to outside groups such as support staff while maintaining central policy
control
User Directory Enables Check Point gateways to leverage LDAP-based user information stores, eliminating the risks associated with manually
maintaining and synchronizing redundant data stores.
IPS Event Analysis Complete IPS event management system providing situational visibility, easy to use forensic tools, and reporting.
Smart Provisioning Provides centralized administration and provisioning of Check Point security devices via a single management console.
Smart Workflow Provides a formal process of policy change management that helps administrators reduce errors and enhance compliance.
Reporting Turns vast amounts of security and network data into graphical, easy-to-understand reports.
Event Correlation Centralized, real-time security event correlation and management for Check Point and third-party devices.
Logging & Status Comprehensive information in the form of logs and a complete visual picture of changes to gateways, tunnels, remove users and
security activities
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 23
Inspect Engine
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 24
Policy Installation Overview
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 25
SIC
• SIC is used to setup a Secure Communication Channel between the Check Point nodes
(such as Security Management server, gateways or OPSEC modules)
• Certificates for authentication
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 26
Agenda
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 27
Check Point Product
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 28
Check Point 4800:
Enterprise-Grade, High-End Features
Hot-swappable
redundant power
supplies
©2012 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 29
4000 & 12000 IO Cards Modularity
A broad range of supported line cards:
©2012 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 30
Software Blades
©2012 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 31
Smart-1 Appliances for Smart Event
©2012 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 32
Agenda
©2012 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 33
Backup & Restore
Configuration
• CLI
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 34
Graphical User Interface(GUI)
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 35
Graphical User Interface(GUI)
• Specify the Filename name and they are Five option to store
that file.
• Before taking the backup make sure that your GUI clients are
disconnected from Smart center.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 36
Command Line Interface(CLI)
Where:
•<exported file name> - the path to export the DB
Where:
•<path> - The location of the exported file
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 37
Thank You
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 38
Questions?
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and 39