Check Point Remote Access Solutions
Providing Secure Remote Access
In today's business environment, it is clear that workers require remote access to sensitive information from a variety of locations and a variety of devices. Organizations must also make sure that their corporate network remains safe and that remote access does not become a weak point in their IT security.
This chapter:
- Gives you information about Check Point's secure remote access options.
- Helps you decide which remote access client or clients best match your organization's requirements.
- Shows you where to get more information.
Types of Solutions
All of Check Point's Remote Access solutions provide:
- Enterprise-grade, secure connectivity to corporate resources.
- Strong user authentication.
- Granular access control.
Factors to consider when choosing remote access solutions for your organization:
- - Does the solution require a Check Point client to be installed on the endpoint computer or is it clientless, for which only a web browser is required. You might need multiple solutions within your organization to meet different needs.
- - Which capabilities does the solution include?
- - Traffic is encrypted between the client and VPN gateway. After users authenticate, they can access the corporate resources that are permitted to them in the access policy. All Check Point solutions supply this.
- - Endpoint computers are protected at all times, even when there is no connectivity to the corporate network. Some Check Point solutions supply this.
Client-Based vs. Clientless
Check Point remote access solutions use IPsec and SSL encryption protocols to create secure connections. All Check Point clients can work through NAT devices, hotspots, and proxies in situations with complex topologies, such as airports or hotels. These are the types of installations for remote access solutions:
- - Client application installed on endpoint computers and devices. Clients are usually installed on a managed device, such as a company-owned computer. The client supplies access to most types of corporate resources according to the access privileges of the user.
- - Users connect through a web browser and use HTTPS connections. Clientless solutions usually supply access to web-based corporate resources.
- - Users connect through a web browser and a client is installed when necessary. The client supplies access to most types of corporate resources according to the access privileges of the user.
Secure Connectivity and Endpoint Security
You can combine secure connectivity with additional features to protect the network or endpoint computers.
Remote Access Solution Comparison
Details of the newest version for each client and a link for more information are in sk67820.
Name
|
Supported Operating Systems
|
Client or Clientless
|
Encryption Protocol
|
Security Verification for Endpoint Devices
|
Desktop Firewall on Endpoint Devices
|
Mobile Access Web Portal
|
Windows, Linux, Mac
|
Clientless
|
SSL
|
|
|
SSL Network Extender for Mobile Access Blade
|
Windows, Linux, Mac OS
|
On-demand Client through Mobile Access Portal)
|
SSL
|
|
|
Check Point Mobile for iPhone and iPad
|
iOS
|
Client
|
SSL
|
|
|
Check Point Mobile VPN for iOS
|
iOS
|
Client
|
IPsec / SSL
|
|
|
Check Point Mobile for Android
|
Android
|
Client
|
SSL
|
|
|
SecuRemote
|
Windows
|
Client
|
IPsec
|
|
|
Check Point Mobile for Windows
|
Windows
|
Client
|
IPsec
|
|
|
Endpoint Security VPN for Windows
|
Windows
|
Client
|
IPsec
|
|
|
Endpoint Security VPN for Mac
|
Mac OS
|
Client
|
IPsec
|
|
|
Endpoint Security Suite Remote Access VPN Blade
|
Windows
|
Client
|
IPsec
|
|
|
Check Point GO VPN
|
Windows
|
Clientless - Requires a Check Point GO device
|
SSL
|
|
|
Summary of Remote Access Options
Below is a summary of each Remote Access option that Check Point offers. All supply secure remote access to corporate resources, but each has different features and meets different organizational requirements.
Details of the newest version for each client and a link for more information are in sk67820.
Mobile Access Web Portal
The Mobile Access Portal is a clientless SSL VPN solution. It is recommended for users who require access to corporate resources from home, an internet kiosk, or another unmanaged computer. The Mobile Access Portal can also be used with managed devices.
It provides:
- Secure Connectivity
- Security Verification
The Mobile Access Portal supplies access to web-based corporate resources. You can use the on-demand client, SSL Network Extender, through the Portal to access all types of corporate resources.
Required Licenses: Mobile Access Software Blade on the gateway.
Supported Platforms: Windows, Mac OS X, Linux
Where to Get the Client: Included with the Security Gateway. See sk67820.
SSL Network Extender
SSL Network Extender is a thin SSL VPN on-demand client installed automatically on the user's machine through a web browser. It supplies access to all types of corporate resources.
SSL Network Extender has two modes:
- - Users can access all application types (Native-IP-based and Web-based) in the internal network. To install the Network Mode client, users must have administrator privileges on the client computer.
Supported Platforms: Windows, Mac OS X, Linux
- - Users can access most application types (Native-IP-based and Web-based) in the internal network, including most TCP applications. The user does not require administrator privileges on the endpoint machine.
Supported Platforms: Windows
Required Licenses:
Mobile Access Software Blade on the gateway
Where to Get the Client: Included with the Security Gateway. See sk67820.
SecuRemote
SecuRemote is a secure, but limited-function IPsec VPN client. It provides secure connectivity.
Required Licenses: IPsec VPN Software Blade on the gateway. It is a client and does not require additional licenses.
Supported Platforms: Windows
Where to Get the Client: Check Point Support Center - sk67820.
Check Point Mobile for Windows
Check Point Mobile for Windows is an IPsec VPN client. It is best for medium to large enterprises that do not require an Endpoint Security policy.
It provides:
- Secure Connectivity
- Security Verification
Required Licenses: IPsec VPN and Mobile Access Software Blades on the gateway.
Supported Platforms: Windows
Where to Get the Client: Check Point Support Center - sk67820.
Endpoint Security VPN
Endpoint Security VPN is an IPsec VPN client that replaces SecureClient. It is best for medium to large enterprises.
It provides:
- Secure Connectivity
- Security Verification
- Endpoint Security that includes an integrated Desktop Firewall, centrally managed from the Security Management Server.
Required Licenses: The IPsec VPN Software Blade on the gateway, an Endpoint Container license, and an Endpoint VPN Software Blade license on the Security Management Server.
Supported Platforms: Windows
Where to Get the Client: Check Point Support Center - sk67820.
|
Note - Endpoint Security VPN on Mac OS X includes a Desktop Firewall but not Security Verification.
|
Endpoint Security VPN for Mac
Endpoint Security VPN combines Remote Access VPN with Endpoint Security in a client that is installed on endpoint computers. It is recommended for managed endpoints that require a simple and transparent remote access experience together with desktop firewall rules. It includes:
- Enterprise Grade Remote Access Client that replaces SecureClient for Mac.
- Integrated Desktop Firewall, centrally managed from the Security Management Server.
Required Licenses: The IPsec VPN Software Blade on the gateway, an Endpoint Container license, and an Endpoint VPN Software Blade license on the Security Management Server.
Supported Platforms for Users: Mac OS X
Where to Get the Client: Check Point Support Center - sk67820.
Endpoint Security Suite
The Endpoint Security Suite simplifies endpoint security management by unifying all endpoint security capabilities in a single console. Optional Endpoint Security Software Blades include: Firewall, Compliance Full Disk Encryption, Media Encryption & Port Protection, and Anti- Malware & Program Control. As part of this solution, the Remote Access VPN Software Blade provides full, secure IPsec VPN connectivity.
The Endpoint Security suite is best for medium to large enterprises that want to manage the endpoint security of all of their endpoint computers in one unified console.
Required Licenses: Endpoint Security Container and Management licenses and an Endpoint VPN Software Blade on the Security Management Server.
Supported Platforms: Windows
Where to Get the Client: Check Point Support Center - sk67820.
Check Point Mobile for iPhone and iPad
Check Point Mobile for iPhone and iPad is an SSL VPN client. It supplies secure connectivity and access to web-based corporate resources and Exchange ActiveSync.
Check Point Mobile for iPhone and iPad is ideal for mobile workers who have iPhone or iPad devices.
Required Licenses: Mobile Access Software Blade on the gateway
Supported Platforms: iOS
Where to Get the Client: Apple App Store
Check Point Mobile VPN for iOS Devices
Check Point Mobile VPN is a full L3 tunnel app that gives users network access to all mobile applications. It supplies secure connectivity and access to all types of corporate resources..
Required Licenses: Mobile Access Software Blade on the gateway
Supported Platforms: iOS 5.0 +
Where to Get the Client: Apple App Store
Check Point Mobile for Android
Check Point Mobile for Android is an SSL VPN client. It supplies secure connectivity and access to web-based corporate resources and Exchange ActiveSync.
Check Point Mobile for Android is ideal for mobile workers who have Android devices.
Required Licenses: Mobile Access Software Blade on the gateway
Supported Platforms: Android
Where to Get the Client: Android Market
Check Point GO
Check Point GO is a portable workspace with virtualized Windows applications, on a secure and encrypted USB Flash Drive. Users insert the USB device into a host PC and securely access their workspace and corporate resources through SSL VPN technology.
Check Point GO is ideal for mobile workers, contractors, and disaster recovery. The virtual workspace is segregated from the host PC and controls the applications and data that can run in Check Point GO.
It provides:
- Secure Connectivity
- Security Verification
Required Licenses: IPsec VPN Software Blade on the gateway and Check Point GO devices.
Supported Platforms: Windows
Where to Get the Client: Check Point Support Center - sk67820.
|