Upload
ruby-tyler
View
219
Download
1
Tags:
Embed Size (px)
Citation preview
©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
SmartWorkflowChange Management Software BladeSmartWorkflowChange Management Software Blade
2©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
AgendaAgenda
Changing Business Needs Why Change Management? Introducing SmartWorkflow Summary
3©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
Gateways
Risk to Security Risk to Compliance Risk to Performance Risk to Network Uptime
Changing Business NeedsChanging Business Needs
IT Administrators
MultiplePolicy Changes
MultiplePolicy Changes
Business Needs
ConstantStream ofChange Requests
Multiple and frequent changes to security policies often lead to mis-configurations and security risks
4©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
VISIBILITY AND CONTROL
Why Change Management?Why Change Management?
COMPLIANCE
MITIGATE RISKS
5©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
Introducing SmartWorkflow Software BladeIntroducing SmartWorkflow Software Blade
Automated Policy Change Management
6©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
SmartWorkflow Life CycleSmartWorkflow Life Cycle
7©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
Introducing SmartWorkflowIntroducing SmartWorkflow
Single Management Console
Improves security and efficiency while reducing costs
Visual change trackingReduces risk of security policy
configuration errors
Flexible authorizationConforms to established approval
processes
Comprehensive audit and reporting
Enhances compliance by tracking evolution of policy changes
Automated Policy Change Management
8©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
Edit PoliciesEdit Policies
Changes Highlighted in SmartDashboard Make and visualize changes in SmartDashboard
Policy changes are made directly in the console and highlighted for better tracking
NewObject
ChangeHighlighted
9©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
Easy review of changes with side by side difference report
Review ChangesReview Changes
Policy BEFORE change Policy AFTER Change
10©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
Approve ChangesApprove Changes
Review and Approve ChangesChanges Highlighted in SmartDashboardHighlighted changes promote easy approval
process and reduce errors
APPROVED!
AddedObject
ChangedPolicy
11©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
Flexible Authorization
Configuration Options:
Role-based approval
Self Approval
Emergency Bypass
Conforms to an organization’s existing approval process
12©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
Audit TrailsAudit Trails
Who?
Audit Trail
What? When? How? Why?
Review and Approve ChangesChanges Highlighted in SmartDashboardTracks evolution of policy changes and all necessary details for regulatory compliance
13©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties
SmartWorkflow SummarySmartWorkflow Summary
Single Console Integration
Visual change tracking
Flexible authorization
Audit trails
Automated Policy Change Management