A SmartConsole user with permissions to manage Check Point security products and the network environment.
A record of an action that is done by an Administrator. See also Log.
Two or more Security Gateways that work together in a redundant configuration - High Availability.
A Security Gateway that is part of a cluster.
To select or to enter values that change how a product works.
Integration of Endpoint Security server compliance to verify internal network connections.
A SmartEvent software component that analyzes logs and detects events.
A user defined report for a Check Point product, typically based on a predefined report.
The Check Point database includes all objects, including network objects, users, services, servers, and protection profiles.
Data Loss Prevention. Detects and prevents the unauthorized transmission of confidential information.
A record of a security or network incident that is based on one or more logs, and on a customizable set of rules that are defined in the Event Policy.
A procedure that extracts, aggregates, correlates and analyses events from the logs.
A set of rules that define the behavior of SmartEvent.
Computers and networks that are outside of the protected network.
See also |
Computers and resources protected by the Firewall and accessed by authenticated users.
See also |
Intrusion Prevention System. Check Point Software Blade that inspects and analyzes packets and data for numerous types of risks.
A record of an action that is done by a Software Blade.
Physical server that hosts Check Point product log files.
A Check Point Security Management Server or a Multi-Domain Server.
1. A configuration of nodes and connecting branches. 2. A site of machines, services, and the links (physical, virtual, wireless, encrypted) that connect them.
A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.
A default report included in a Check Point product that you can run right out of the box.
An encryption tunnel between a Security Gateway and remote access clients, such as Endpoint Security VPN, and communities.
A summary of network activity and Security Policy enforcement that is generated by Check Point products such as SmartEvent.
A cluster that has identical Check Point Security Gateway members for High Availability and Load Sharing.
A computer that runs Check Point software to inspect traffic and enforces Security Policies for connected network resources.
A computer that runs Check Point software to manage the objects and policies in Check Point environment.
A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.
A Check Point GUI application used to manage Security Policies, monitor products and events, install updates, provision new devices and appliances, and manage a multi-domain environment and each domain.
Physical server that hosts the events database.
A software blade is a security solution based on specific business needs.
Each blade is independent, modular and centrally managed. To extend security, additional blades can be quickly added.
SmartConsole data or report on status, activity, and resource usage of Check Point products.
The flow of data between network devices.
Virtual Private Network. A secure, encrypted connection between networks and remote clients on a public infrastructure, to give authenticated remote users and sites secured access to an organization's network and resources.
An encrypted connection between two hosts using standard protocols (such as L2TP) to encrypt traffic going in and decrypt it coming out, creating an encapsulated network through which data can be safely shared as though on a physical private line.