Check Point User Directory Software Blade

The Check Point User Directory Software Blade leverages LDAP servers to obtain identification and security information about network users, eliminating the risks associated with manually maintaining and synchronizing redundant data stores, and enabling centralized user management throughout the enterprise.
Centralized user management throughout the enterprise
- Integrates enterprise security policy with any LDAP-compliant application
- Eliminates risks with manually maintaining and synchronizing redundant data
- Automatically includes all necessary user directory security elements
Broad support; ease of management
- View, modify and create users, groups via easy-to-use SmartDashboard™ GUI
- Supports Microsoft Active Directory and other leading LDAP solutions
- Supports LDAP and LDAP over SSL (LDAPS)
Integrated into Check Point Software Blade Architecture
- Activate centralized user management on any Check Point Security Management server
- Supported on Check Point Appliances and open servers.
Leverages LDAP-based User Information Stores
The Check Point User Directory Software Blade leverages LDAP servers to obtain identification and security information about network users, eliminating the risks associated with manually maintaining and synchronizing redundant data stores.
The Check Point User Directory Software Blade leverages LDAP servers to obtain identification and security information about network users, eliminating the risks associated with manually maintaining and synchronizing redundant data stores.
With the Software Blade, Check Point security gateways become full LDAP clients which communicate with LDAP servers to obtain identification and security information about network users. The User Directory Software Blade leverages the flexibility of the LDAP protocol by extending the schema to include all necessary user-level security elements. This information is then available not only to Check Point security gateways to enforce enterprise security policy, but to any LDAP-compliant application, enabling centralized user management throughout the enterprise.
Centralized User Management
The User Directory Software Blade facilitates centralized user management throughout the enterprise by enforcing enterprise security policy on any LDAP-compliant application. View, modify and create users and groups with SmartDashboard.
The User Directory Software Blade facilitates centralized user management throughout the enterprise by enforcing enterprise security policy on any LDAP-compliant application. With SmartDashboard, an easy-to-use GUI, administrators can view, modify and create users, groups and other objects.
Support for Microsoft Active Directory
The Check Point User Directory Software Blade supports leading LDAP solutions, including Microsoft Active Directory.
The Check Point User Directory Software Blade supports leading LDAP solutions, including Microsoft Active Directory.
Integrated into Check Point Software Blade Architecture
The User Directory Software Blade is fully integrated into the Software Blade architecture, saving time and reducing costs by allowing customers to quickly expand security protections to meet changing requirements.
The User Directory Software Blade is integrated into the Software Blade Architecture. It can be easily and rapidly activated on existing Check Point Security Management server saving time and reducing costs by leveraging existing security infrastructure.
Full integration into the modular Software Blade Architecture allows for rapid and easy activation on any Check Point Security Management server.
Software Blade Specifications
| Feature | Details |
|---|---|
| LDAP vendor support | Microsoft, Novell, Red Hat, Sun Microsystems, and other OPSEC certified LDAP partners |
| LDAP Protocols | LDAPS and LDAP |
| Predefined, customizable profiles | Microsoft, Novell, Netscape |
| LDAP group support | Static and Dynamic |
| Extended schema | Check Point extended schema to support password management and other vendor-specific attributes |
| Redundancy | Ability to query multiple LDAP servers and ability to distribute users across multiple LDAP servers |
| Graphical interface | View, modify, and create users, groups, and other objects through an easy-to-use GUI. |
| Internet Protocol Versions | IPv6 and IPv4 |
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite

