Effective and focused threat analysis with customizable visibility
Detect cyber threats from big data in seconds
One single view for all security threats and network components*
With more than 50 Check Point gateways deployed around the world, the Check Point management solution gives us a single view of our universe through a central console. This enables us to manage our entire infrastructure with two local administrators and keep labor costs extremely low.
IT Security Manager
With Next Generation SmartEvent, monitor all activity and events and correlate multiple logs to identify suspicious activity from the clutter. Rapid data analysis, and the ability to create customized event logs, immediately alerts administrators to discrepancies and inconsistencies such as someone attempting to use the same credential in multiple geographies simultaneously.
Next Generation SmartEvent delivers the ability to handle exponentially more logs per day, delivering faster, unprecedented performance to organizations of any size. From small and medium businesses to large enterprises and data centers, Next Generation SmartEvent enables organizations to perform big data cyber threat detection in seconds. Generate a weekly report of activity in less than ten seconds with Next Generation SmartEvent.
Search much larger databases, over 100 million logs, in less than one second. Easily access billions of historical logs to aid in forensic analysis and compliance. Next Generation SmartEvent provides the scale and speed to handle your most complex security environments.
SmartEvent ensures you can stay on top of your network, no matter where you go. The SmartEvent web portal provides access to SmartEvent from anywhere, at any time, using mobile phones and tablet devices.*
*Available in the next major release
The SmartEvent Software Blade is fully integrated into the Software Blade architecture. It can be easily and rapidly deployed on Smart-1 appliances, saving time and reducing costs by allowing customers to quickly expand security protections to meet changing requirements.
|Protocol/Application Support||500 plus protocol types|
|VoIP Protection||SIP, H.323, MGCP and SIP with NAT support|
|Network Address Translation||Static/hide NAT support with manual or automatic rules|
|DHCP Gateways||Security gateways can have dynamic IP addresses|
|VLAN||Up to 256 VLANs per interface|
|Link Aggregation||802.3ad passive and 802.3ad active|
|Bridge Mode / Transparent Mode||Inspect traffic without interfering with the original IP routing|
|Extensive Set of Policy Objects||Individual node, networks, groups, dynamic objects|
|IP Versions||IPv4 and IPv6|
|Fail-Safe Protections||Default filter provides protection during boot time and prior to initial policy|
|Secure Internet Communications (SIC)||Certificate-based secure communications channel among all Check Point distributed components belonging to a single management domain|
|Multiple Authentication Methods||User authentication, client authentication, session authentication|
|Local Users||Local database user store included|
|RADIUS and RADIUS Groups||Multiple servers and MS-CHAPv2, MS-PAP methods|
|LDAP and LDAP Groups||Microsoft Active Directory, Novell Directory Server, Red Hat Directory Server, OPSEC certified LDAP server|
|X.509 Certificates||Supported using the included Certificate Authority or third party CAs|
|Customizable Authentication Messages||Supported|