Centralizes access to security data for easy analysis, trending and compliance
Maximizes operational efficiency, saving time and cost
Integrated into Check Point Software Blade Architecture
The SmartReporter Software Blade provides a large number of predefined reports that simplify network security reporting and save administrative time and cost by eliminating the need to create custom reports. These reports are organized into easy-to-use categories like cross-product security and network activity, firewall security and network activity, endpoint security and antivirus, plus product-specific reports.
Each report is further subdivided into sections that provide detailed information about a particular type of traffic or activity on the network. Also, reports can be tailored to suit the information requirements of different users. If there is a specific need not addressed by a predefined report, a security administrator can easily customize a report by adjusting the report filters to capture only the relevant data.
SmartReporter comes bundled with the SmartEvent Software Blade.
The SmartReporter Software Blade simplifies network security management by enabling administrators to schedule regular reports without constant manual intervention. Multiple reporting schedules can be maintained, making it flexible enough to meet the most demanding reporting needs. These reports can be automatically distributed to specific users via email or uploaded to FTP or Web sites.
With automatic report generation, SmartReporter enables organizations to efficiently capture security and network intelligence on an ongoing basis. Administrators can also generate reports for overall security performance analysis or auditing.
The SmartReporter Software Blade supports both Check Point Multi-Domain Security Management and security management environments. In the Provider-1 environment, SmartReporter can be configured for global reporting or reporting targeted at a specific network segment or customer. Multiple SmartReporter Software Blade deployments can be implemented to run in parallel, scaling to meet the reporting needs of large-scale environments. The SmartReporter Software Blade offers a variety of installation configurations for both large and small organizations. Where performance and deployment flexibility are key requirements, the SmartReporter Software Blade can be installed on a dedicated machine. Where cost and simplicity are the primary considerations, the SmartReporter Software Blade can be installed on the same machine as the security management or Check Point SmartEvent server.
Compliance reports in the SmartReporter Software Blade enable enterprises to report on their regulatory compliance posture. Compliance reports have been mapped to relevant requirements within the Payment Card Industry (PCI), Sarbanes-Oxley (SOX), Health Insurance Portability and Accountability (HIPAA), Control Objectives for Information Technology (COBIT) and ISO 27002 regulations and standards.
The SmartReporter Software Blade is integrated into the Software Blade Architecture. It can be easily and rapidly activated on existing Check Point security management servers saving time and reducing costs by leveraging existing security infrastructure.
|Secure LogCollection||Agent-based using the secure Check Point OPSEC LEA API|
|Log Consolidation||Combines instances with the same key information to compress data|
|Customizable Consolidation Policy||Managed from SmartDashboard|
|Predefined Reports||Large number of predefined reports on security, firewall, network activity, endpoint status and antivirus activity|
|Express Reports||Reports based on SNMP-like counters and history files|
|Standard Reports||Reports based on consolidating log files|
|Short-term Storage||60 days by default|
|Long-term Storage||Yes, depending upon the hardware|
|Events per Second||Up to 6,000|
|Management Blade and Multi-Domain Management Blade Support||Supports global or customer-specific reporting|
|Automatic Report Distribution||Supports web, email, FTP and custom scripts|
|Report Customization||Report content, reporting period, input sources, filter content values, report scheduling, output style and view sample reports|
|Log Consolidation Customization||From the beginning, end or specific log files|
|Role-based Administraion||Synchronized with the management Software Blade|
|Standardized Reporting||Health Insurance Portability and Accountability Act (HIPPA), Gramm-leach-Bliley Act (GLBA) and Federal Information Security Management Act (FISMA), Basel II and Visa’s Cardholder Information Security Program (CISP).|
|Control Frameworks Supported||COBIT - Control Objectives for Information Technology; ISO 27002|