Infrastruktur Sicherheit mit Checkpoint



Similar documents
Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Security Administration R77

CHECK POINT. Software Blade Architecture

CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Check Point. Software Blade Architecture

Securing Virtualization with Check Point and Consolidation with Virtualized Security

LICENSE GUIDE. Software Blades products. Number of Strings. SKU Prefix Name Description Additive

Move over, TMG! Replacing TMG with Sophos UTM

Astaro Gateway Software Applications

Cisco Small Business ISA500 Series Integrated Security Appliances

Komplettschutz für den Mittelstand

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Appliance Comparison Chart

Security Appliances. for a wide field of application. Comprehensive threat management, secure Internet access, and secure remote access.

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

V1.4. Spambrella Continuity SaaS. August 2

Network protection and UTM Buyers Guide

Fortigate Features & Demo

Check Point License Guide (April-2012) General Pricelist

Next Gen Firewall and UTM Buyers Guide

Network Security Solution. Arktos Lam

Cloud and VM Based Security

The Attacker s Target: The Small Business

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Web Request Routing. Technical Brief. What s the best option for your web security deployment?

Cisco ASA 5500 Series Business Edition

Netzwerkvirtualisierung? Aber mit Sicherheit!

McAfee Next Generation Firewall (NGFW) Administration Course

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Check Point 3D Security

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Virtualized Security: The Next Generation of Consolidation

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Check Point Security Administrator R70

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Appliance Comparison Chart

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Cisco SR 520-T1 Secure Router

PART D NETWORK SERVICES

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment

Top 10 Reasons Enterprises are Moving Security to the Cloud

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

Emerging Trends in the Network Security Market in India, CY 2013

Check Point 4800 Appliance

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Advantages of Managed Security Services

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Endpoint protection for physical and virtual desktops

Mobile Access R Administration Guide. 13 August Classification: [Protected]

F IREWALL/VPN REFERENCE GUIDE

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise

Putting Web Threat Protection and Content Filtering in the Cloud

SofaWare Management Architecture Basics

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

CHECK POINT TOTAL SECURITY APPLIANCES. Flexible Deployment. Centralized Management.

Unified Threat Management, Managed Security, and the Cloud Services Model

74% 96 Action Items. Compliance

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Cisco IOS Advanced Firewall

Firewall Feature Overview

Firewall and UTM Solutions Guide

Results of Testing: Juniper Branch SRX Firewalls

funkwerk packetalarm NG IDS/IPS Systems

Trend Micro Wer denkt schon an die Security der SAP Anwendungen? Timo Wege, Technical Consultant DACH Trend Micro Deutschland GmbH

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Reaping the Full Benefits of a Hybrid Network

Cisco ASA 5500 Series VPN Edition for the Enterprise

Chapter 9 Firewalls and Intrusion Prevention Systems

Cisco ASA und FirePOWER Services

Endpoint Protection Small Business Edition 2013?

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Check Point Positions

UBIqube unified Managed Services Solution MSActivator. Managed VoIP Module Q1-09

Stonesoft 5.5. Firewall/VPN Reference Guide. Firewall Virtual Private Networks

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

Deploying Firewalls Throughout Your Organization

Transcription:

Infrastruktur Sicherheit mit Checkpoint Neue Module Markus Kohlmeier Teamleiter Internet und Security Services

Übersicht Checkpoint Releases Firewall 1 4.1, release 2000 Firewall 1 NG, FP1, FP2 und FP3, release August 2002 Firewall 1 NG AI R54 und R55, release November 2003 Firewall 1 NGX R60, release August 2005 Firewall 1 NGX R61, release März 2006 Firewall 1 NGX R62, release November 2006 Firewall 1 NGX R65, release März 2007 Firewall 1 NGX R70, release März 2009 Firewall 1 NGX R71, release April 2010 Firewall 1 NGX R75, release Januar 2011

Software Blades Gateway Produkte Firewall IPSEC VPN Mobile Access Identity Awareness Application Control IPS DLP Web Security URL Filtering Antivirus & Anti-Malware Anti-Spam & Email Security Advanced Networking Acceleration & Clustering Voice over IP (VoIP) Management Produkte Network Policy Management Endpoint Policy Management Logging & Status SmartWorkflow Monitoring Management Portal User Directory SmartProvisioning SmartReporter SmartEvent

Mobile Access Einfache Verbindung für mobile Geräte Sichert Anbindungen von Smartphones, Tablets, PCs und Laptops Bietet Client-based und Web-based VPN Verbindungen Einfache Anbindung von eigenen und externen Mitarbeitern Zentrales Management und einfaches Rollout Integration in den Check Point Security Policy Manager Installation und Konfiguration der Mobile Access Software Blade auf bestehenden Security Gateways

Identity Awareness Transparente Protokollierung von User-Aktivitäten Zentral verwaltete Benutzer-Zugriffe auf Unternehmensressourcen und Applikationen Granulare User-, Gruppen- and Machinen-basierende Protokollierung und Policy enforcement Bessere Einschränkung von Zugriffen Strikte Vorgaben beim Zugriff auf Data Center Ressourcen, Applikationen und Netzwerkesegmente Schützt vor Verlust von Daten durch restriktiven Zugriff auf Daten aufgrund von Userinformationen

Application Control Application Control Identifiziert, erlaubt, blockt oder limitiert die Benutzung von Applikationen basierend auf User- und Gruppeninformationen Integration in Check Point Software Blade Architecture Zentrales Management der Security Policy aus einer Konsole Ermöglicht application control auf jeden Check Point Security Gateway

Vielen Dank für Ihre Aufmerksamkeit! DTS Systeme GmbH Markus Kohlmeier markus.kohlmeier@dts.de April 2011

Anhang Management Module Network Policy Management - Comprehensive network security policy management for Check Point gateways and blades via SmartDashboard, a single, unified console Endpoint Policy Management - Centrally deploy, manage, monitor and enforce security policy for all endpoint devices across any sized organization. Logging & Status - Comprehensive information in the form of logs and a complete visual picture of changes to gateways, tunnels, remove users and security activities SmartWorkflow - Provides a formal process of policy change management that helps administrators reduce errors and enhance compliance. Monitoring - A complete view of network and security performance, enabling fast response to changes in traffic patterns and security events. Management Portal - Extends a browser-based view of security policies to outside groups such as support staff while maintaining central policy control User Directory - Enables Check Point gateways to leverage LDAP-based user information stores, eliminating the risks associated with manually maintaining and synchronizing redundant data stores. SmartProvisioning - Provides centralized administration and provisioning of Check Point security devices via a single management console. SmartReporter - Turns vast amounts of security and network data into graphical, easy-to-understand reports. SmartEvent - SmartEvent translates security information into action.

Anhang Gateway Module Firewall - World's most proven firewall secures more than 200 applications, protocols and services featuring the most adaptive and intelligent inspection technology. IPsec VPN - Secure connectivity for offices and end users via sophisticated but easy to manage Site-to-Site VPN and flexible remote access. Mobile Access - The safe and easy solution to connect to corporate applications over the Internet with Smartphones or PCs. IPS - The highest performing integrated IPS solution with the industry's best threat coverage Application Control - Provides strong application and identity controls by allowing organizations to create policies which identify, block or limit usage of thousands of applications, based on user identity. Identity Awareness - Provides granular security policy at a per user, per group and per machine level. It centralizes the management, monitoring and reporting of user actions across the internal network, its perimeter and beyond. DLP - Combines technology and processes to prevent data loss of critical business information Web Security - Advanced protection for the entire Web environment featuring the strongest protection against buffer-overflow attacks. URL Filtering - Best-of-breed Web filtering covering more than 20 million URLs protects users and enterprises by restricting access to dangerous Web sites. Antivirus & Anti-Malware - Leading antivirus protection including heuristic virus analysis stops viruses, worms and other malware at the gateway Anti-Spam & Email Security - Multi-dimensional protection for the messaging infrastructure stops spam, protects servers and eliminates attacks through email. Advanced Networking - Adds dynamic routing, multicast support and Quality of Service (QOS) to security gateways. Acceleration & Clustering - Patented SecureXL and ClusterXL technologies provide wire speed packet inspection, high availability and load sharing. Voice over IP - Advanced connectivity and security features for VoIP deployments, featuring enhanced Rate Limiting protections, Far end NAT and inspection of SIP TLS.