Upload
davebrosnan
View
1.249
Download
1
Embed Size (px)
DESCRIPTION
checkpoint
Citation preview
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties
Multi-Domain Management Software Blades
Introduction for Administrators
22©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Agenda
1
2
Introduction to Multi-Domains
3
Introduction for Administrators
Summary
33©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Easy and Affordable
Security Management Customer Needs
Better
Security
Stronger Security
Greater Simplicity
ConsolidateManagement
SegmentDomains
Consistent Global Policy
44©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Multi Domains
Perimeter firewalls
Corporate branches
Internal firewalls
DMZ firewalls
Data center firewalls
Get Increased Flexibility and Simplicity
Segment your Security Management Environment into Smaller Virtual Domains
Segment your Security Management Environment into Smaller Virtual Domains
55©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Get Increased Flexibility and Simplicity
Multi Domains
Perimeter firewalls
Corporate branches
Internal firewalls
Data center firewalls
DMZ firewalls
Segment your Security Management Environment into Smaller Virtual Domains
Segment your Security Management Environment into Smaller Virtual Domains
66©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Eases the Way to Multi-Domain Security Management
Check Point Eases the Way to Multi-Domain Security Management
Introducing Check Point Multi-Domain Software Blades
Deploy multi-domain management simply and affordably
Achieve better securitywith consistent global policies
Maximize security by segmenting management in virtual domains
77©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Delivering Virtual Security Management to Businesses of All Sizes
Delivering Virtual Security Management to Businesses of All Sizes
Multi-Domain Software Blades
Consistent global security policy for better security
Global Policy BladeSecurity Domain Software Blades
Segment your security management into multiple virtual domains
Common security baseline across multiple domains
Single configuration for VPN, firewall, IPS and other protections
Common objects can be shared across domains
Each security domain is independent
Similar functionality as a Security Management Server (SmartCenter) [own IP address]
Administered with a familiar interface SmartConsole
88©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Eases the Way to Multi-Domain Security Management
Check Point Eases the Way to Multi-Domain Security Management
Introducing Check Point Multi-Domain Software Blades
Deploy multi-domain management simply and affordably
Achieve better securitywith consistent global policies
Maximize security by segmenting management in virtual domains
99©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Granular Role-Based Administration
Define administrator access per management
domain
Maintain separation of duties and increase flexibility Maintain separation of duties and increase flexibility
1010©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Role-Based Administrators
Click to add administrator Jane
Predefined roles
Once created, assign to domain(s)
Add domains to manage
Assign permission
after adding to domains
Administrator with full access to multiple domainsAdministrator with full access to multiple domains
First administrator created with full access to domains
1111©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Role-Based Administrators
Right-click to assigndomain
Newly created administrator
Tom
Add single domain to manage
Assign Limited Access for Second AdministratorAssign Limited Access for Second Administrator
Create customized
roles
Easily change granular rights
Second administrator created with limited access
1212©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
More Control with Multi-Domains
Centrally manage virtual management domains
Segmenting your environment across separate management domains
Segmenting your environment across separate management domains
1313©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Click to add new domain
Easily Create a New Domain
Wizard Simplifies Creation of New DomainsWizard Simplifies Creation of New Domains
Domain nameEuropean_Offices
Flexible global object distribution
Global IPS profiles
Assign administrators
to domain
New domain Created
1414©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Eases the Way to Multi-Domain Security Management
Check Point Eases the Way to Multi-Domain Security Management
Introducing Check Point Multi-Domain Software Blades
Deploy multi-domain management simply and affordably
Achieve better securitywith consistent global policies
Maximize security by segmenting management in virtual domains
1515©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Get Better Security with a Consistent Global Policy
Easily Enforce a Common Security Baseline by Streamlining Global Rules Across Multiple Domains
Easily Enforce a Common Security Baseline by Streamlining Global Rules Across Multiple Domains
Centrally manage global
policies across
multiple domains
1616©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global Firewall Policy
Global Policies
Domain Policies
Shared Baseline Security Policies
Assign global policies on domainFrom global policies
1717©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global VPN Policy
Manage single global VPN
configuration for all domains
Targeted at simplified VPN mode
Single configuration across domains
Automates domain VPN configurations
Easily Manage VPN Policies Across Domains
1818©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global IPS
Centrally Managed IPS
Manage single global IPS policy for all domains
Assign different profiles to various gateways
IPS protections are centrally managed
Multiple IPS profiles can be configured globally
Flexible domain assignment of IPS profiles
Further customization of protections in domain profile
1919©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global Policy Assignment
Manage Single Global Security Policy for All Domains
Shared Global Security Policies
DMZPerimeter Branch offices
Virtual Management Domains
2020©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global Policy Assignment
Strengthen Security with baseline policyStrengthen Security with baseline policy
Right click to assign policy
Simply choose policy to assign
to domain
2121©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Eases the Way to Multi-Domain Security Management
Check Point Eases the Way to Multi-Domain Security Management
Introducing Check Point Multi-Domain Software Blades
Deploy multi-domain management simply and affordably
Achieve better securitywith consistent global policies
Maximize security by segmenting management in virtual domains
2222©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Deployment Choices
Easily add to your existing security management
Global Policy and Security Domain Software Blades
Smart-1 Dedicated Appliance
Pre-configuredPlug-and-play
Multiple Deployment Options!
2323©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Multi-Domain Security Management on Smart-1
Smart-1 50
Easy with Software blades
Centralized Management for
Multiple DomainsUp to 12 TB of
Integrated Storage
Smart-1 150
2424©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Eases the Way to Multi-Domain Security Management
Check Point Eases the Way to Multi-Domain Security Management
Summary
Deploy multi-domain management simply and affordably
Achieve better securitywith consistent global policies
Maximize security by segmenting management in virtual domains
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties
Thank you!
For more information, www.checkpoint.com