How to Get NAC Up-and-Running in One Hour. For Check Point Firewall or Endpoint Security Administrators
|
|
|
- Oscar Patrick
- 10 years ago
- Views:
Transcription
1 How to Get NAC Up-and-Running in One Hour For Check Point Firewall or Endpoint Security Administrators
2 Contents Introduction 3 Defining an Organization s Requirements for NAC 3 Two Paths to NAC Port vs. Gateway 4 Deciding if Port or Gateway NAC Is Right for an Organization 4 Issues for Deploying Port-based NAC 5 Deploying Gateway-based NAC 5 Using the Check Point Security Gateway for Gateway-based NAC 6 Configuration 6 Conclusion 9 Check Point Software Technologies Ltd. 2
3 Introduction The ability for enterprises to control access to their networks is vital for security and compliance. Network access control (NAC) ensures that only policy-compliant individuals and machines can access resources on a network. NAC also blocks malware, prevents data breaches, and helps with regulatory compliance. The idea of NAC is to control access through network-based enforcement, such as on a switch or gateway. Access control policies are based on a user s identity and business authorizations. With NAC, access control is centralized, granular, auditable, and strong. The promise of NAC is huge, but so are the evolving (and competing) architectures that are typically complex, difficult and expensive to deploy and manage. Consequently, after years of promise, many organizations have yet to tap the benefits of NAC. Check Point offers a quick way to deploy NAC and get its benefits without getting bogged down in complex deployment scenarios. With a Check Point firewall, organizations can get policy-based NAC up-and-running in an hour. This white paper describes how. Defining an Organization s Requirements for NAC The process of choosing a NAC solution involves a number of decisions. An organization must assess its degree of risk related to unauthorized access, determine which NAC technology will mitigate the risk, establish how quickly a solution is required, and evaluate the cost and effort associated with that solution. Here is what an organization should expect from a NAC solution: NAC will enforce policy for different sets of users depending on how and where they enter the network. The NAC enforcement mechanism will ensure that security policy is automatically applied to all endpoints using the network including remote workers, network guests, mobile workers and partners. Typical policies for NAC will relate to use of up-to-date antivirus and antispyware software, disk encryption status, approved endpoint firewall rules, software patches, specific versions of authorized applications, and correct registry entries. NAC may be applied to managed assets (employee PCs, devices) and unmanaged assets (devices owned by guests, some printers). NAC will quarantine unsafe endpoints and automatically bring them into compliance. Productivity will be ensured by sandboxing a user to permit working while the endpoint is fixed. NAC will restrict network access by unknown guests. NAC Glossary Network Access Control (NAC) Security protocols for controlling access to a network based on policies and user identities. Similar to NAC frameworks with other acronyms (see related sidebar). Pre-admission vs. Post-admission Enforcement of NAC policy either before or after a user or machine accesses the network. Pre-admission might consist of requiring an endpoint to update antivirus signatures before access. Post-admission usually monitors endpoint compliance after a user has accessed the network. Remediation, Quarantine and Captive Portals NAC technologies that automatically repair endpoints (e.g. update antivirus signatures) before granting access. Quarantine is a restricted IP network that allows employees to continue working while an endpoint undergoes remediation. A captive portal can help automate repair via the web. Cooperative Enforcement NAC technology from Check Point that uses a firewall, VPN server, switch, or wireless access point as an enforcement point to quarantine and remediate hosts that fall out of compliance with a gateway security policy. EAP The Extensible Authentication Protocol is a universal framework for authenticating users in wireless networks and point-to-point connections. EAP is used to define message formats X An IEEE standard for portbased authentication. Authentication requires communications between a supplicant (client software), authenticator (switch or wireless access point), and authentication server (usually a RADIUS database). Check Point Software Technologies Ltd. 3
4 Two Paths to NAC Port vs. Gateway With NAC, access control is typically performed by the network infrastructure. There are two fundamental paths for deployment of network-enforced NAC. The first taps the traffic control capabilities of ports on an 802.1X-compliant network switch. Port-based NAC is supported by several NAC frameworks (see sidebar). The other path is gateway-based, which applies access controls between networks. Other non-network infrastructure enforcement methods exist such as DHCP, IPSec, and self-enforcement; however, these methods are not covered in this paper. Port-based NAC uses 802.1X to enforce strict switch port security. All hosts authenticate using an Extensible Authentication Protocol (EAP) supplicant before being granted layer 2 data-link access (e.g. Ethernet) to a network. A port-based solution will quarantine non-compliant devices at the network edge. A gateway-based NAC solution is different; it performs restriction at the layer 3 network level (e.g. IP). An EAP supplicant is not required although an agent is used to perform identification of the endpoint and to perform health policy checks. A gateway-based solution will quarantine between networks. The following table compares features of port- and gateway-based NAC: NAC Features Port-based Gateway-based Enforcement type 802.1X Cooperative Enforcement Enforcement point Switch, wireless access point Firewall OSI enforcement layer Layer 2 (Data-link) Layer 3 (Network) Quarantine scope VLAN or port ACL Gateway, network edge Table 1. Comparing features of port- and gateway-based NAC If the primary goal of an organization s NAC project is to prevent unauthorized machines from plugging in to a network, an 802.1X-based solution may be the best path. However, if the organization s goals are more to perform endpoint health checks and ensure policy compliance, a gateway-based NAC is a simpler and more cost effective solution. Deciding if Port or Gateway NAC Is Right for an Organization The complexity of NAC frameworks has earned it a reputation for being hard to deploy and manage. It s easy to find roadblocks, which is why aspirations for NAC have stalled in so many organizations. But many users need NAC now because their security posture is weak, and threats are growing every day. As a result, organizations are implementing NAC in ways that are different from its debut in For some, port-based NAC is still a requirement. Gateway NAC, however, allows administrators to get the most important benefits of NAC right away, without the complexity and costs of using switches for enforcement. NAC Frameworks Several NAC frameworks provide systematic, policy-based means for controlling network access via ports on a switch. The frameworks were originally based on 802.1X, but have expanded to unify other endpoint security technology. Implementing a NAC framework is complex and can require significant change to an organization s network infrastructure. The frameworks include: TNC Trusted Computing Group s Trusted Network Connect. Framework by a multi-vendor consortium that aims to provide endpoint integrity at every network connection in a multivendor network. NEA IETF s Network Endpoint Assessment. NEA is a standardsdriven development of open protocols for access control based on policies governed by an endpoint s security posture. It s designed for multivendor interoperability and is correspondingly complex. CNAC Cisco Network Admission Control. Framework by Cisco Systems, Inc. that restricts access based on identity or security posture. A key component is the Cisco Trust Agent that allows endpoints to communicate with Cisco routers. MSNAP Microsoft Network Access Protection. Framework by Microsoft Corporation to control access of a computer based on system health of that host. Administrators configure policies to govern compliance for access. MSNAP is typically deployed in Microsoft-centric networks. 1 Gartner, Magic Quadrant for Network Access Control (27 March 2009) Check Point Software Technologies Ltd. 4
5 Issues for Deploying Port-based NAC Deploying port-based NAC is a complex process. Many skills are needed to configure 802.1X products in large deployments. The network security team needs to know how to upgrade and configure the organization s switches to support 802.1X, segment the network using VLANs, configure RADIUS servers, interface with various user directories, and configure and roll-out EAP supplicants. When planning an 802.1X infrastructure, organizations should consider what NAC standards (if any) will be required to achieve the NAC deployment s end goals. Typically, the goals will dictate what specific RADIUS servers, supplicants, and other additional components may be required for a successful deployment. It s also important to understand the inherent limitations in port-based NAC. A typical enterprise will want to attach many devices to the network that don t support 802.1X, such as older printers and phones. A strategy will be required to prevent people from using the physical ports of these devices to obtain unauthorized access. The organization will also want to have some idea of how to grant access to guest workers who won t necessarily be able to participate in its 802.1X architecture. These aren t easy problems to solve, and they often times involve upgrading equipment or buying new NAC architecture components such as captive portals, endpoint profiling servers, and other ad-hoc stop gaps. Despite these challenges, Check Point is not against port-based NAC. Check Point has a long history of supporting and integrating with numerous NAC technologies, beginning with VPN device integration (Cisco, Nortel, Check Point) and later 802.1X. We sell port-based NAC to meet customer requirements. If those requirements mandate the functionality of 802.1X, organizations should be prepared to implement a solution with a multitude of moving parts and their associated technological complexity. Deploying Gateway-based NAC It became apparent early on that 802.1X could only be deployed in certain networks under very controlled circumstances. What users needed was a way to leapfrog the complexity of 802.1X without losing the most important benefits. The result is gateway-based NAC. Rather than enforcing policy at the port level like 802.1X, the firewall integration enforces policy at the network segment/gateway level. For example, a common objective for NAC is to ensure that a user s device is in compliance with the organization s endpoint policy. Such a policy could potentially require the presence of anti-virus software or a specific Microsoft Service Pack on all endpoints. With gateway NAC, if a non-compliant device attempts to connect to the network, the gateway firewall will restrict the host and redirect its web traffic to a captive portal. Turning on the firewall NAC feature in a network with this integration can be done in an hour; by comparison, 802.1X implementations can take months. This firewall NAC integration provides many of the same benefits as port-based NAC without the associated costs. Check Point Software Technologies Ltd. 5
6 Using the Check Point Security Gateway for Gateway-based NAC The Check Point gateway NAC solution requires a R65 (and above) Security Gateway and Endpoint Security R70 (and above). There are no new licenses required beyond these two products. The rest of this section describes the steps necessary to enable gateway-based NAC. Endpoint Security uses the firewall as an enforcement point to quarantine and remediate hosts that fall out of compliance with a gateway policy. This NAC capability is called Cooperative Enforcement. Using Cooperative Enforcement, a gateway policy can require connecting clients to possess a minimum set of virus definitions or prohibit the use of a specific application (e.g., Skype or AIM). Clients that fall out compliance with the gateway policy can be disconnected, restricted, or placed into network quarantine. For example, a Check Point Security Gateway can restrict network traffic for clients that have fallen out of compliance with the enterprise security policy. When a policy violation occurs, a popup message is displayed from the Endpoint Security client s tray icon. After a period of warning, the gateway firewall will restrict the host and redirect all client web traffic to a captive portal like the one shown in the screen shot below. Check Point Endpoint Security Check Point Endpoint Security is the first and only single agent that combines all essential components for total security on the endpoint: n Highest-rated firewall n Antivirus, anti-spyware n Full-disk encryption n Media encryption with port protection n Network access control (NAC) n Program control and VPN Check Point Endpoint Security protects PCs and eliminates the need to deploy and manage multiple agents, reducing total cost of ownership. Cooperative Enforcement Captive Portal Once the user has taken manual action to correct the problem or auto-remediation completes, the restriction is lifted and the client is removed from the firewall quarantine. Alternatively, an administrator can choose to enforce an alternative set of gateway firewall rules rather than capturing traffic to a quarantine portal when an endpoint is out of compliance. In the case of hosts that do not or are not capable of running an endpoint agent (printer, phone, etc.), these devices can be exempted from the cooperative enforcement policy. Typically, however, these devices do not have an operational need to pass traffic through a gateway enforcement point. Configuration Configuration is a simple three-step procedure. First, Cooperative Enforcement must be enabled on the Check Point Security Gateway. Second, the Endpoint Security server must be configured to perform Cooperative Enforcement with the Security Gateway. Third, enforcement rules must be created and added to a policy. Check Point Software Technologies Ltd. 6
7 The administrator will start by launching the SmartDashboard application and connecting to the SmartCenter. Double-click the firewall gateway from the Network Objects list. Next, navigate to the Cooperative Enforcement configuration screen. Choose the Authorize clients using Endpoint Security Server check box and select the organization s Endpoint Security server from the drop down box as seen below. Click the OK button to return to the dashboard. Finally, select Install Policy from the Policy drop-down. On the Endpoint Security server, navigate to the Gateway Manager and define a new Check Point VPN-1 POWER/UTM gateway as seen below. Check Point Software Technologies Ltd. 7
8 On the New Gateway screen, enter the host name or IP address of the Security Gateway that will be enforcing the Cooperative Enforcement gateway NAC policy. Click Save when complete. Finally, define an enforcement rule. Within a policy, click on the Enforcement Settings tab and choose the Add button. Choose New Rule followed by Enforcement Rule. (Alternatively, an Anti-virus or Client rule can be used.) For testing purposes, create a simple rule that looks for the presence of a file or registry entry on an endpoint as pictured below. Click Save when complete. Select the newly created enforcement rule and click Add. To save your policy, click the Save button. That s it! Congratulations this simple process allowed the setup of gateway NAC in under an hour. Check Point Software Technologies Ltd. 8
9 Conclusion NAC can provide an organization with powerful, granular control of endpoint network access. Port-based NAC deployment is challenging, but gateway NAC can deploy in one hour with a Check Point firewall. Check Point Endpoint Security includes support for both port-based and gateway-based solutions. The policybased controls provided by gateway NAC will be sufficient for many organizations. Doing a pilot project with gateway-based NAC is a simple process that allows an organization to leverage an existing Check Point firewall. The firewall will be the gateway enforcement point for policy-based NAC. We invite your organization to contact its Check Point sales representative to learn more about NAC capabilities it may already own, and how these can be leveraged with the NAC functions of Check Point Endpoint Security. Check Point Software Technologies Ltd. 9
10 About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. ( worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented Stateful Inspection technology. Today, Check Point continues to innovate with the development of the software blade architecture. The dynamic software blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft. CHECK POINT OFFICES Worldwide Headquarters 5 Ha Solelim Street Tel Aviv 67897, Israel Tel: Fax: [email protected] U.S. Headquarters 800 Bridge Parkway Redwood City, CA Tel: ; Fax: URL: Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Endpoint Security, Check Point Endpoint Security On Demand, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Full Disk Encryption, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management,Power-1, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, Sentivist, SiteManager-1, Smart-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartProvisioning, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartView Tracker, SMP, SMP On-Demand, SofaWare, SSL Network Extender, Stateful Clustering, Total Security, the totalsecurity logo, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Total Security, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, VSX-1, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm ForceField, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications. July 2, 2009
The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be
The Evolution of IPS Intrusion Prevention (Protection) Systems aren't what they used to be The Evolution of IPS Contents Background 3 Past Case for Standalone IPS 3 Organizational Control 3 Best-of-Breed
CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.
CHECK POINT Software Blade Architecture Secure. Flexible. Simple. softwareblades from Check Point Today s Security Challenge Protecting networks against today s constantly evolving threat environment has
CHECK POINT. Software Blade Architecture
CHECK POINT Software Blade Architecture 2 softwareblades from Check Point Today s Security Challenge Protecting enterprises against today s constantly evolving threat environment has never been more challenging.
Endpoint Security Considerations for Achieving PCI Compliance
Endpoint Security Considerations for Achieving PCI Compliance Contents PCI Requirements and Endpoint Security 3 Overview of the PCI Data Security Standard 3 Developing a PCI Compliance Plan 4 Endpoint
Leverage IPS to Make Patch Tuesday Just Another Day
Leverage IPS to Make Patch Tuesday Just Another Day Contents Introduction 3 Evolution of a Practice 3 Weaknesses of the Model 4 Lack of timeliness 4 Inherent predictability 4 Painful disruptions 5 A Better
How to Implement an Integrated GRC Architecture
How to Implement an Integrated GRC Architecture Companies that select individual solutions for each regulatory challenge they face will spend 10 times more on IT portion of compliance projects than companies
Check Point Whitepaper. Check Point Abra: A Virtual Secure Workspace Technical Whitepaper
Check Point Whitepaper Check Point Abra: A Virtual Secure Workspace Technical Whitepaper Contents An Increasingly Mobile World 3 Threats and Dangers of a Mobile Workforce 3 Abra Provides the Solution 4
Check Point Software Blade Architecture. Achieving the right balance between security protection and investment
Check Point Software Blade Architecture Achieving the right balance between security protection and investment Check Point Software Blade Architecture Contents Introduction 3 Check Point Software Blade
Check Point Software Blade Architecture. Achieving the right balance between security protection and investment
Check Point Software Blade Architecture Achieving the right balance between security protection and investment Contents Introduction 3 Check Point Software Blade architecture overview 3 What is a Software
CHECK POINT TOTAL SECURITY APPLIANCES. Flexible Deployment. Centralized Management.
CHECK POINT TOTAL SECURITY APPLIANCES Flexible Deployment. Centralized Management. Check Point appliances deliver a powerful turnkey solution for deploying Check Point awardwinning software solutions to
The Power-1 Performance Architecture: Delivering Application-layer Security at Data Center Performance Levels
The Power-1 Performance Architecture: Delivering Application-layer Security at Data Center Performance Levels The Power-1 Performance Architecture Contents Introduction 3 A delicate balance: Performance
Check Point Whitepaper. Enterprise IPv6 Transition Technical Whitepaper
Check Point Whitepaper Enterprise IPv6 Transition Technical Whitepaper Contents Introduction 3 Transition Mechanisms 3 Dual Stack 4 Tunneling 4 Translation 7 Recommendations 8 Transition Security Considerations
Check Point Endpoint Security. Single agent for endpoint security delivering total protection and simplified management
Single agent for endpoint security delivering total protection and simplified management Contents Executive summary 3 Meeting the challenge of securing endpoints 4 A new strategy: Unifying endpoint security
USB Drives: Friend or Foe? New User Trends and Exploits in USB Requires Security Controls to Protect Endpoints and the Networked Enterprise
New User Trends and Exploits in USB Requires Security Controls to Protect Endpoints and the Networked Enterprise Contents Executive Summary 3 Exploiting Risks of USB Drives and Portable Applications 3
Solving the Performance Hurdle for Integrated IPS
Solving the Performance Hurdle for Integrated IPS New Check Point Technologies Enable a Full-Function, Integrated Intrusion Prevention System without Compromise to Performance or Security Solving the Performance
Check Point Corporate Logo Usage Guidelines
Check Point Corporate Logo Usage Guidelines 1. The Check Point Logo The Check Point logo is the most visible and recognizable symbol of our brand. It should appear on every piece of communication from
Check Point. Software Blade Architecture
Check Point Software Blade Architecture TODAY S SECURITY CHALLENGE Protecting enterprises against today s constantly evolving threat environment has never been more challenging. Infrastructure, connectivity
Unified Threat Management from Check Point. The security you need. The simplicity you want
Unified Threat Management from Check Point The security you need. The simplicity you want Unified Threat Management from Check Point Contents Introduction 3 Complexity of the security problem 3 Comprehensive
Best Practices for Deploying Intrusion Prevention Systems. A better approach to securing networks
Best Practices for Deploying Intrusion Prevention Systems A better approach to securing networks A better approach to securing networks Contents Introduction 3 Understanding deployment needs 3 Selecting
Check Point Endpoint Security Full Disk Encryption. Detailed product overview for Windows and Linux
Check Point Endpoint Security Full Disk Encryption Detailed product overview for Windows and Linux Check Point Endpoint Security Full Disk Encryption Contents How secure is my data? 3 How effective is
Check Point UserAuthority Guide. Version NGX R61
Check Point UserAuthority Guide Version NGX R61 700358 January 2006 2003-2006 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright
Integrity Advanced Server Gateway Integration Guide
Integrity Advanced Server Gateway Integration Guide 1-0273-0650-2006-03-09 Editor's Notes: 2006 Check Point Software Technologies Ltd. All rights reserved. Check Point, Application Intelligence, Check
Preventing Data Leaks on USB Ports. Check Point Endpoint Security Media Encryption simply regulates access and data for any plug-and-play peripherals
Preventing Data Leaks on USB Ports Check Point Endpoint Security Media Encryption simply regulates access and data for any plug-and-play peripherals Preventing Data Leaks on USB Ports Contents Executive
Check Point QoS. Administration Guide Version NGX R65
Check Point QoS Administration Guide Version NGX R65 700726 January 2007 2003-2007 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright
Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe [email protected]
Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe [email protected] NAC is Here to Enforce identity-based access policies Control who is accessing what Prevent guests
Firewall and SmartDefense. Administration Guide Version NGX R65
Firewall and SmartDefense Administration Guide Version NGX R65 701682 April 27, 2008 2003-2007 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
A Getting Started Guide: What Every Small Business Needs To Know About Internet Security
A Getting Started Guide: What Every Small Business Needs To Know About Internet Security In This Document 1 Overview: Internet Security In Small Businesses 2 Internet Access New Business Opportunities
Pointsec PC. Quick Start Guide
Pointsec PC Quick Start Guide Version 6.3.1 HFA1, A April 2008 2003-2008 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and
User Guide for Zone Labs Security Software
User Guide for Zone Labs Security Software Version 5.5 Smarter Security TM 2004 Zone Labs, Inc. All rights reserved. 2004 Check Point Software Technologies Ltd. All rights reserved. Check Point, Application
A Practical Guide to Web Application Security
Mitigating the OWASP Ten Most Critical Web Application Security Problems with s In This Document Introduction 2 The Top 10 Web Application Vulnerabilities and Their Remedies 1: Unvalidated Input 3 2: Broken
Configuring Check Point Firewall-1 to support Avaya Contact Center Solutions - Issue 1.1
Avaya Solution & Interoperability Test Lab Configuring Check Point Firewall-1 to support Avaya Contact Center Solutions - Issue 1.1 Abstract These Application Notes explain how to configure Check Point
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
The Seven Key Factors for Internet Security TCO
The Seven Key Factors for Internet Security TCO Executive Summary Total Cost of Ownership, or TCO, of any information technology deployment consists of more than simply the direct costs of acquisition
User Guide for ZoneAlarm security software
User Guide for ZoneAlarm security software version 7.0 Smarter Security TM 2007 Zone Labs, LLC. All rights reserved. 2007 Check Point Software Technologies Ltd. All rights reserved. Check Point, Application
LICENSE GUIDE. Software Blades products. Number of Strings. SKU Prefix Name Description Additive
LICENSE GUIDE Software Blades products SKU Prefix Name Description Additive CPAP-SG5075 CPAP-SG9075 CPAP-SG11065 CPAP-SG11075 CPAP-SG11085 CPAP-IP2455 CPAP-IP1285 CPAP-IP695 CPAP-IP565 CPAP-IP395 CPAP-IP295
The Attacker s Target: The Small Business
Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection
PURE Security. Revolutionising the way you think about IT Security. Protected infrastructure and data. Unified security architecture
PURE Security Revolutionising the way you think about IT Security Since founding in 1993 has become the de facto standard in network security. Today we are more than just a firewall vendor. Our PURE security
How To Set Up Checkpoint Vpn For A Home Office Worker
SofaWare VPN Configuration Guide Part No.: 700411 Oct 2002 For Safe@ gateway version 3 COPYRIGHT & TRADEMARKS Copyright 2002 SofaWare, All Rights Reserved. SofaWare, SofaWare S-box, Safe@Home and Safe@Office
Check Point Positions
Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.
Antivirus. Quick Start Guide. Antivirus
Antivirus 2007 Antivirus plus I Firewall Quick Start Guide Helpful Information on Installation and Set-Up STOPS and Removes Viruses DELIVERS Proactive Firewall Protection EASY to Set Up and Use FREE Upgrades
SECURITY APPLIANCES www.checkpoint.com
CHECK POINT SECURITY APPLIANCES www.checkpoint.com Table of Contents Introduction 1 Power-1 Appliances 2 IP Appliances 3 UTM-1 Appliances 4 Series 80 Appliance 5 VSX-1 Appliances 6 DLP-1 Appliances 7 Smart-1
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Check Point Appliances. 2012 Models
Check Point Appliances 2012 Models Table of Contents Introduction 3 Check Point GAiA the Next-Gen Security OS 4 About SecurityPower 5 2200 Appliance 6 4000 Appliances 7 12000 Appliances 8 21400 Appliance
Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement
Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
» WHITE PAPER. 802.1X and NAC: Best Practices for Effective Network Access Control. www.bradfordnetworks.com
» WHITE PAPER 802.1X and NAC: Best Practices for Effective Network Access Control White Paper» 802.1X and NAC: Best Practices for Effective Network Access Control 1 IEEE 802.1X is an IEEE (Institute of
Cisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network
Check Point ZoneAlarm
Check Point ZoneAlarm Secure Wireless Router Z100G User Guide Version 7.5 August 2007 COPYRIGHT & TRADEMARKS Copyright 2007 SofaWare, All Rights Reserved. No part of this document may be reproduced in
DIGIPASS Authentication for Check Point Security Gateways
DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
Cert Pro 4/17/01 2:05 AM Page 1 T HE C HECK P OINT. Certified Professional Program SECURE. www.checkpoint.com/ccpp
Cert Pro 4/17/01 2:05 AM Page 1 T HE C HECK P OINT Professional Program SECURE YOUR FUTURE www.checkpoint.com/ccpp Cert Pro 4/17/01 2:05 AM Page 2 Certify your Future Companies that select Check Point
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs P/N 500205 July 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 1 Integrated VPN/firewall Page 2 placed
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
Whitepaper. Securing Visitor Access through Network Access Control Technology
Securing Visitor Access through Contents Introduction 3 The ForeScout Solution for Securing Visitor Access 4 Implementing Security Policies for Visitor Access 4 Providing Secure Visitor Access How it works.
Check Point Safe@Office 500 UTM Frequently Asked Questions
For internal use only Check Point Safe@Office 500 UTM Frequently Asked Questions Business Related Questions What are Safe@Office appliances? Designed specifically to meet the needs of small businesses,
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
Addressing BYOD Challenges with ForeScout and Motorola Solutions
Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Multi-Domain Security Management
Multi-Domain Security Management R77 Versions Administration Guide 20 May 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
Technical Note. CounterACT: 802.1X and Network Access Control
CounterACT: 802.1X and Contents Introduction...3 What is 802.1X?...3 Key Concepts.... 3 Protocol Operation...4 What is NAC?...4 Key Objectives.... 5 NAC Capabilities.... 5 The Role of 802.1X in NAC...6
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Microsoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
Internet Content Provider Safeguards Customer Networks and Services
Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Network Security Solutions Implementing Network Access Control (NAC)
Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting a network with Sophos NAC Advanced and Switches Sophos NAC Advanced is a sophisticated Network Access Control
Network Access Security It's Broke, Now What? June 15, 2010
Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's
Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco
Secure Access into Industrial Automation and Systems Industry Best Practice and Trends Serhii Konovalov Venkat Pothamsetty Cisco Vendor offers a remote firmware update and PLC programming. Contractor asks
