Security Management Software Blades
Provides the right level of protection at the right level of investment....

Software Blades are independent and flexible security modules that enable you to select the functions you want to build a custom Check Point Security Gateway. Software Blades can be purchased independently or as pre-defined bundles.
 |
|
Check Point offers a full range of proven services that help companies extend their security investment with check-ups, network design and planning, new installations and upgrades, custom training and optimization services to maximize your security performance.
Check Point Network Policy Management
 |
|
The Check Point Network Policy Management Software Blade provides comprehensive, centralized network security policy management for Check Point gateways and Software Blades, via SmartDashboard—a single, unified console that provides control over even the most complex security deployments. |
Check Point Endpoint Policy Management
 |
|
The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities in a single console. Monitor, manage and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks. |
Check Point Logging & Status Software Blade
 |
|
The Check Point Logging & Status Software Blade provides real-time visibility regarding security status and activities through log tracking and provides a complete visual picture of changes to gateways, tunnels and remote users. |
Check Point SmartWorkflow
 |
|
The Check Point SmartWorkflow Software Blade provides a seamless and automated process for policy change management that helps administrators reduce errors and enhance compliance. Enforce a formal process for editing, reviewing, approving and auditing policy changes from a single console, for one-stop, total policy lifecycle management. |
Check Point Monitoring Software Blade
 |
|
The Check Point Monitoring Software Blade presents a complete picture of network and security performance, enabling fast responses to changes in traffic patterns or security events. The Software Blade centrally monitors Check Point devices and alerts to changes to gateways, endpoints, tunnels, remote users and security activities. |
Management Portal Software Blade
 |
|
The Check Point Management Portal Software Blade allows browser-based security management access to outside groups such as support staff or auditors, while maintaining centralized control of policy enforcement. View security policies, the status of all Check Point products and administrator activity as well as edit, create and modify internal users. |
Check Point User Directory Software Blade
 |
|
The Check Point User Directory Software Blade leverages LDAP servers to obtain identification and security information about network users, eliminating the risks associated with manually maintaining and synchronizing redundant data stores, and enabling centralized user management throughout the enterprise. |
Check Point SmartProvisioning
 |
|
The Check Point SmartProvisioning Software Blade provides centralized administration and security provisioning of Check Point devices. Using profiles, administrators can automate device configuration and easily roll out changes to settings to multiple, geographically distributed devices, via a single security management console. |
Check Point SmartReporter
 |
|
The Check Point SmartReporter Software Blade increases the visibility of security threats by centralizing network security reporting of network, security and user activity into concise predefined or custom-built reports. Easy report generation and automatic distribution save time and money and allow organizations to maximize security investments. |
Check Point SmartEvent
 |
|
The Check Point SmartEvent Software Blade is a unified security event management and analysis solution that delivers real-time, actionable threat management information. Administrators can quickly identify critical security events, stop threats directly from the event screen, add protections on-the-fly to remediate attacks, all via a single console. |
Multi-Domain Security Management
 |
|
Security Management and Multi-Domain Security Management (Provider-1) delivers more security and control by segmenting your security management into multiple virtual domains. Businesses of all sizes can easily create virtual domains based on geography, business unit or security function to strengthen security and simplify management. |
|
|
|
|
Further information on Check Point Products and Services is available from our marketing team on 0118 979 0000 or email us at info@acenseo.com.
No comments:
Post a Comment