Compliance Software Blade
Check Point is Revolutionizing Compliance with the first integrated and fully automated security & compliance monitoring. The Check Point Compliance Software Blade provides continuous monitoring, strengthens regulatory compliance, maintains secure policy, and reduces audit time & costs.
Real Time Compliance Monitoring across Check Point Software Blades
- Delivers real-time assessment of compliance with major regulations
- Instant notification on policy changes impacting compliance
- Provides actionable recommendations to improve compliance
Library of Over 250 Security Best Practices
- Translates thousands of complex regulatory requirements into actionable security best practices
- Monitors constantly gateway configuration with the security best practices
- Generates automated assessment reports for compliance rating with top regulations
Fully Integrated into Software Blade Architecture & Management
- Check compliance with every policy change for all Network Security Software Blades
- 360° visibility of compliance status in Check Point SmartDashboard
- Compliance Software Blade can be expanded to GRC capabilities with Check Point easy2comply
Regulatory Compliance
The Compliance Software Blade provides a clear overview of security compliance position and enables the monitoring of multiple regulations in a single view. Regulations are broken down into the individual requirements and mapped to Check Point’s library of security best practices.

The Compliance Software Blade provides a clear overview of security compliance position and enables the monitoring of multiple regulations in a single view. Regulations are broken down into the individual requirements and mapped to Check Point’s library of security best practices.

Security Best Practices
At the heart of the Compliance Software Blade are hundreds of best practices that define and recommend the optimal configuration for the Check Point Software Blades and management settings. The Compliance Software Blade constantly monitors the compliance status of the organization, enabling network security managers to quickly assess the strength of the current policy settings and where improvements are needed. All best practices have been defined by Check Point security experts.

Understand the strength of your security configuration

Monitor the preformance of specific gateways and software blades within your network. Security administrators can preform comparisons across the network and see which products are configured properly according to Check Point best practices
At the heart of the Compliance Software Blade are hundreds of best practices that define and recommend the optimal configuration for the Check Point Software Blades and management settings. The Compliance Software Blade constantly monitors the compliance status of the organization, enabling network security managers to quickly assess the strength of the current policy settings and where improvements are needed. All best practices have been defined by Check Point security experts

Understand the strength of your security configuration

Monitor the preformance of specific gateways and software blades within your network. Security administrators can preform comparisons across the network and see which products are configured properly according to Check Point best practices
Automated Compliance Alerts
Automatic compliance alerts are generated by configuration changes to other Check Point Network Security Software Blades. Alerts highlight potential security and compliance violations, reducing the time required and errors associated with manual compliance management. Compliance alerts notify users of the impact of their security decisions and brings regulatory considerations into the forefront of security management.

Automatic compliance alerts are generated by configuration changes to other Check Point Network Security Software Blades. Alerts highlight potential security and compliance violations, reducing the time required and errors associated with manual compliance management. Compliance alerts notify users of the impact of their security decisions and brings regulatory considerations into the forefront of security management.

Recommendations and Action Management
All security best practices have corresponding recommendations, assisting security managers in understanding what actions need to be taken to improve compliance and security. The Compliance Software Blade enables effective management of actions and recommendations, and facilitates the prioritization and scheduling of action items.

All security best practices have corresponding recommendations, assisting security managers in understanding what actions need to be taken to improve compliance and security. The Compliance Software Blade enables effective management of actions and recommendations, and facilitates the prioritization and scheduling of action items.

Integrated into Check Point Software Blade Architecture
The Compliance Software Blade is fully integrated into the Check Point Software Blade Architecture. It is the only compliance product that can be automatically and natively implemented with Check Point.
Specifications
|
Supported Features | Details |
|---|---|
| Platforms | Management, Multi-Domain Management |
| Opperating Systems | GAiA, SecurePlatform, Windows |
| Versions | R75.40, R75.45 |
| Software Blades | Firewall, IPSec VPN, Mobile Access, IPS, Anti-Bot, Anti-Virus, Anti-Spam & Email Security, Identity Awareness, Application Control, URL Filtering and DLP |
|
Supported Features | Details |
|---|---|
| Platforms | Management, Multi-Domain Management |
| Opperating Systems | GAiA, SecurePlatform, Windows |
| Versions | R75.40, R75.45 |
| Software Blades | Firewall, IPSec VPN, Mobile Access, IPS, Anti-Bot, Anti-Virus, Anti-Spam & Email Security, Identity Awareness, Application Control, URL Filtering and DLP |
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite

