039
CHECK POINT 2013 SECURITY REPORT
06
_ SUMMARY AND SECURITY STRATEGY
not all companies want the same security everywhere.
Companies are looking for flexibility and control of their
security resources.
Software Blades are security applications or modules
such as a firewall, Virtual Private Network (VPN),
Intrusion Prevention System (IPS), or Application
Control to name a few, that are independent, modular
and centrally managed. They allow organizations to
customize a security configuration that targets the right
mix of protection and investment. Software Blades can
be quickly enabled and configured on any gateway or
management system with a simple click of a mouse—no
hardware, firmware or driver upgrades required. And as
needs evolve, additional Software Blades can be easily
activated to extend security to an existing configuration
on the same security hardware.
Check Point offers a centralized event management for
all Check Point products as well as third-party devices.
Providing security events real-time views to help quickly
grasp the security situation and take immediate actions,
all via a single console. The timeline view enables the
visualization of trends and propagation of attacks. The
charts view provides event statistics in either a pie chart
or a bar graph format. The maps view shows potential
threats by country.
Check Point Security Gateway
SmartDashboard. Software Blades
activation screen
Check Point SmartEvent security events management. Real-time overview.
1...,28,29,30,31,32,33,34,35,36,37 39,40,41,42,43,44,45,46,47,48,...50