The Check Point SmartReporter Software Blade increases the visibility of security threats by centralizing network security reporting of network, security and user activity into concise predefined or custom-built reports. Easy report generation and automatic distribution save time and money and allow organizations to maximize security investments.


Centralizes access to security data for easy analysis, trending and compliance

  • Centralized reporting of network, security, user activity
  • Custom reports can be tailored for unique information requirements
  • Provides reporting for regulatory compliance

Maximizes operational efficiency, saving time and cost

  • Predefined report template options
  • Automatic reporting and report distribution
  • Streamlines security and network activity trend reporting

Integrated into Check Point Software Blade Architecture

  • Activate SmartReporter on any Check Point management server
  • Save time and reduce costs by leveraging existing security infrastructure


Predefined and Custom Centralized Reporting

The SmartReporter Software Blade provides a large number of predefined reports that simplify network security reporting and save administrative time and cost by eliminating the need to create custom reports.  These reports are organized into easy-to-use categories like cross-product security and network activity, firewall security and network activity, endpoint security and antivirus, plus product-specific reports.

Each report is further subdivided into sections that provide detailed information about a particular type of traffic or activity on the network. Also, reports can be tailored to suit the information requirements of different users. If there is a specific need not addressed by a predefined report, a security administrator can easily customize a report by adjusting the report filters to capture only the relevant data.

SmartReporter comes bundled with the SmartEvent Software Blade.

Flexible Scalability and Simplified Deployment

The SmartReporter Software Blade supports both Check Point Multi-Domain Security Management and security management environments. In the Provider-1 environment, SmartReporter can be configured for global reporting or reporting targeted at a specific network segment or customer. Multiple SmartReporter Software Blade deployments can be implemented to run in parallel, scaling to meet the reporting needs of large-scale environments. The SmartReporter Software Blade offers a variety of installation configurations for both large and small organizations. Where performance and deployment flexibility are key requirements, the SmartReporter Software Blade can be installed on a dedicated machine. Where cost and simplicity are the primary considerations, the SmartReporter Software Blade can be installed on the same machine as the security management or Check Point SmartEvent server.

Integrated into Check Point Software Blade Architecture

The SmartReporter Software Blade is integrated into the Software Blade Architecture. It can be easily and rapidly activated on existing Check Point security management servers saving time and reducing costs by leveraging existing security infrastructure.

Automatic Report Distribution and Database Maintenance

The SmartReporter Software Blade simplifies network security management by enabling administrators to schedule regular reports without constant manual intervention. Multiple reporting schedules can be maintained, making it flexible enough to meet the most demanding reporting needs. These reports can be automatically distributed to specific users via email or uploaded to FTP or Web sites.

With automatic report generation, SmartReporter enables organizations to efficiently capture security and network intelligence on an ongoing basis. Administrators can also generate reports for overall security performance analysis or auditing.

Regulatory Compliance Reports

Compliance reports in the SmartReporter Software Blade enable enterprises to report on their regulatory compliance posture. Compliance reports have been mapped to relevant requirements within the Payment Card Industry (PCI), Sarbanes-Oxley (SOX), Health Insurance Portability and Accountability (HIPAA), Control Objectives for Information Technology (COBIT) and ISO 27002 regulations and standards.

Learn More


Secure LogCollectionAgent-based using the secure Check Point OPSEC LEA API
Log ConsolidationCombines instances with the same key information to compress data
Customizable Consolidation PolicyManaged from SmartDashboard
Predefined ReportsLarge number of predefined reports on security, firewall, network activity, endpoint status and antivirus activity
Express ReportsReports based on SNMP-like counters and history files
Standard ReportsReports based on consolidating log files
Automatic Maintenance
Short-term Storage60 days by default
Long-term StorageYes, depending upon the hardware
Events per SecondUp to 6,000
Management Blade and Multi-Domain Management Blade SupportSupports global or customer-specific reporting
Automatic Report DistributionSupports web, email, FTP and custom scripts
Report CustomizationReport content, reporting period, input sources, filter content values, report scheduling, output style and view sample reports
Log Consolidation CustomizationFrom the beginning, end or specific log files
Role-based AdministraionSynchronized with the management Software Blade
Standardized ReportingHealth Insurance Portability and Accountability Act (HIPPA), Gramm-leach-Bliley Act (GLBA) and Federal Information Security Management Act (FISMA), Basel II and Visa’s Cardholder Information Security Program (CISP).
Control Frameworks SupportedCOBIT - Control Objectives for Information Technology; ISO 27002