25
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Multi-Domain Management Software Blades Introduction for Administrators

Multi domain security-management_technical_presentation

Embed Size (px)

DESCRIPTION

checkpoint

Citation preview

Page 1: Multi domain security-management_technical_presentation

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Multi-Domain Management Software Blades

Introduction for Administrators

Page 2: Multi domain security-management_technical_presentation

22©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Agenda

1

2

Introduction to Multi-Domains

3

Introduction for Administrators

Summary

Page 3: Multi domain security-management_technical_presentation

33©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Easy and Affordable

Security Management Customer Needs

Better

Security

Stronger Security

Greater Simplicity

ConsolidateManagement

SegmentDomains

Consistent Global Policy

Page 4: Multi domain security-management_technical_presentation

44©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Multi Domains

Perimeter firewalls

Corporate branches

Internal firewalls

DMZ firewalls

Data center firewalls

Get Increased Flexibility and Simplicity

Segment your Security Management Environment into Smaller Virtual Domains

Segment your Security Management Environment into Smaller Virtual Domains

Page 5: Multi domain security-management_technical_presentation

55©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Get Increased Flexibility and Simplicity

Multi Domains

Perimeter firewalls

Corporate branches

Internal firewalls

Data center firewalls

DMZ firewalls

Segment your Security Management Environment into Smaller Virtual Domains

Segment your Security Management Environment into Smaller Virtual Domains

Page 6: Multi domain security-management_technical_presentation

66©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Eases the Way to Multi-Domain Security Management

Check Point Eases the Way to Multi-Domain Security Management

Introducing Check Point Multi-Domain Software Blades

Deploy multi-domain management simply and affordably

Achieve better securitywith consistent global policies

Maximize security by segmenting management in virtual domains

Page 7: Multi domain security-management_technical_presentation

77©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Delivering Virtual Security Management to Businesses of All Sizes

Delivering Virtual Security Management to Businesses of All Sizes

Multi-Domain Software Blades

Consistent global security policy for better security

Global Policy BladeSecurity Domain Software Blades

Segment your security management into multiple virtual domains

Common security baseline across multiple domains

Single configuration for VPN, firewall, IPS and other protections

Common objects can be shared across domains

Each security domain is independent

Similar functionality as a Security Management Server (SmartCenter) [own IP address]

Administered with a familiar interface SmartConsole

Page 8: Multi domain security-management_technical_presentation

88©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Eases the Way to Multi-Domain Security Management

Check Point Eases the Way to Multi-Domain Security Management

Introducing Check Point Multi-Domain Software Blades

Deploy multi-domain management simply and affordably

Achieve better securitywith consistent global policies

Maximize security by segmenting management in virtual domains

Page 9: Multi domain security-management_technical_presentation

99©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Granular Role-Based Administration

Define administrator access per management

domain

Maintain separation of duties and increase flexibility Maintain separation of duties and increase flexibility

Page 10: Multi domain security-management_technical_presentation

1010©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Role-Based Administrators

Click to add administrator Jane

Predefined roles

Once created, assign to domain(s)

Add domains to manage

Assign permission

after adding to domains

Administrator with full access to multiple domainsAdministrator with full access to multiple domains

First administrator created with full access to domains

Page 11: Multi domain security-management_technical_presentation

1111©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Role-Based Administrators

Right-click to assigndomain

Newly created administrator

Tom

Add single domain to manage

Assign Limited Access for Second AdministratorAssign Limited Access for Second Administrator

Create customized

roles

Easily change granular rights

Second administrator created with limited access

Page 12: Multi domain security-management_technical_presentation

1212©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

More Control with Multi-Domains

Centrally manage virtual management domains

Segmenting your environment across separate management domains

Segmenting your environment across separate management domains

Page 13: Multi domain security-management_technical_presentation

1313©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Click to add new domain

Easily Create a New Domain

Wizard Simplifies Creation of New DomainsWizard Simplifies Creation of New Domains

Domain nameEuropean_Offices

Flexible global object distribution

Global IPS profiles

Assign administrators

to domain

New domain Created

Page 14: Multi domain security-management_technical_presentation

1414©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Eases the Way to Multi-Domain Security Management

Check Point Eases the Way to Multi-Domain Security Management

Introducing Check Point Multi-Domain Software Blades

Deploy multi-domain management simply and affordably

Achieve better securitywith consistent global policies

Maximize security by segmenting management in virtual domains

Page 15: Multi domain security-management_technical_presentation

1515©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Get Better Security with a Consistent Global Policy

Easily Enforce a Common Security Baseline by Streamlining Global Rules Across Multiple Domains

Easily Enforce a Common Security Baseline by Streamlining Global Rules Across Multiple Domains

Centrally manage global

policies across

multiple domains

Page 16: Multi domain security-management_technical_presentation

1616©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Global Firewall Policy

Global Policies

Domain Policies

Shared Baseline Security Policies

Assign global policies on domainFrom global policies

Page 17: Multi domain security-management_technical_presentation

1717©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Global VPN Policy

Manage single global VPN

configuration for all domains

Targeted at simplified VPN mode

Single configuration across domains

Automates domain VPN configurations

Easily Manage VPN Policies Across Domains

Page 18: Multi domain security-management_technical_presentation

1818©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Global IPS

Centrally Managed IPS

Manage single global IPS policy for all domains

Assign different profiles to various gateways

IPS protections are centrally managed

Multiple IPS profiles can be configured globally

Flexible domain assignment of IPS profiles

Further customization of protections in domain profile

Page 19: Multi domain security-management_technical_presentation

1919©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Global Policy Assignment

Manage Single Global Security Policy for All Domains

Shared Global Security Policies

DMZPerimeter Branch offices

Virtual Management Domains

Page 20: Multi domain security-management_technical_presentation

2020©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Global Policy Assignment

Strengthen Security with baseline policyStrengthen Security with baseline policy

Right click to assign policy

Simply choose policy to assign

to domain

Page 21: Multi domain security-management_technical_presentation

2121©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Eases the Way to Multi-Domain Security Management

Check Point Eases the Way to Multi-Domain Security Management

Introducing Check Point Multi-Domain Software Blades

Deploy multi-domain management simply and affordably

Achieve better securitywith consistent global policies

Maximize security by segmenting management in virtual domains

Page 22: Multi domain security-management_technical_presentation

2222©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Deployment Choices

Easily add to your existing security management

Global Policy and Security Domain Software Blades

Smart-1 Dedicated Appliance

Pre-configuredPlug-and-play

Multiple Deployment Options!

Page 23: Multi domain security-management_technical_presentation

2323©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Multi-Domain Security Management on Smart-1

Smart-1 50

Easy with Software blades

Centralized Management for

Multiple DomainsUp to 12 TB of

Integrated Storage

Smart-1 150

Page 24: Multi domain security-management_technical_presentation

2424©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Eases the Way to Multi-Domain Security Management

Check Point Eases the Way to Multi-Domain Security Management

Summary

Deploy multi-domain management simply and affordably

Achieve better securitywith consistent global policies

Maximize security by segmenting management in virtual domains

Page 25: Multi domain security-management_technical_presentation

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Thank you!

For more information, www.checkpoint.com