Maximizes operational efficiency, enables consistent policy management
Centralizes visibility and management of company-wide security posture
Flexible, customizable administrator privileges
The Check Point Network Policy Management Software Blade increases operational efficiency by providing a single integrated and unified console for managing your network security policy.
Configure and administer all the Check Point Security Gateway Software Blades:
Permission profiles allow customization of administrator privileges, enabling the safe creation of auditor and troubleshooting accounts for auxiliary and support staff—including accounts with read-only or read-write access to each Software Blade.
The Network Policy Management Software Blade provides an intuitive graphical user interface for managing a wide set of security policy functions. IT staff can drag-and-drop objects into policy fields, create policy labels and regions, annotate rules, and easily navigate between Software Blade management tabs. It’s all centrally organized in a single, easy-to-use graphical user interface.
Easy-to-use GUI for managing a wide set of security policy functions
The Network Policy Management Software Blade is integrated into the Software Blade Architecture. It can be easily and rapidly activated on existing Check Point Security Management systems, Smart-1 appliances or open server platforms, saving time and reducing costs by leveraging existing security infrastructure.
|Unified Security Gateway Software Blade Management||Firewall, VPN, IPS, Mobile Access, DLP, Application Control, Web Security, URL Filtering, Anti-Virus & Anti-Malware, Anti-Spam & Email Security, Advanced Networking, Acceleration & Clustering, and Voice over IP|
|Search||Query objects and rules|
|Rule Management||Divide into sections and labels|
|Rule Hit Count||Displays the number of instances a rule in the Firewall rulebase was matched to traffic|
|Versions||Manage and create multiple policy versions either automatically or manually|
|Backup and Restore||Easily create clones of a Network Policy Management Software Blade for Disaster Recovery|
|High Availability||Standby Network Management Policy Software Blade configuration supported|
|Role-based Administration||Global and granular administrative access and permissions|
|Multi-platform||Windows Server, Red Hat Linux, Solaris, IPSO, SecurePlatform|
|Revision Control||Maintain multiple policy versions|
|Authentication||LDAP, RADIUS, TACACS, TACACS+, SecurID, local database|
|Intuitive Policy Management||Drag-and-drop, Software Blades separated into multiple tabs|
|OPSEC API||Integrate with third-party partners|
|SmartMap Docked and Undocked View||Undock to better view the map|
|SmartMap Layouts||Hierarchic (tree) or symmetric|
|Tight SmartMap Integration||Create, edit, delete and show where objects are used|
|SmartMap Exports||Visio or image file|
|SmartMap Navigator||Helps when viewing complex topologies|
|Internet Protocol Versions||IPv6 and IPv4|