Zero Trust Server Access

Securely connect to Linux and Windows servers over SSH and RDP through Check Point’s built-in privileged access management (PAM) solution that eliminates the risk associated with holding static credentials.

SOLICITE UNA DEMOSTRACIÓN

The Most Secure Way to Manage Privileged Access

La protección del acceso privilegiado a los servidores se ha centrado tradicionalmente en la gestión de llaves. Pero la gestión, el seguimiento y la rotación de llaves a escala es una tarea casi imposible. El robo de credenciales sigue siendo uno de los vectores de ataque más eficientes y eficaces, ya que tres de cada cuatro empresas son vulnerables a ataques a nivel de raíz debido a una mala gestión de SSH.

La arquitectura Zero Trust de Check Point protege el acceso privilegiado a los servidores a través de una solución PAM integrada que se diseñó para eliminar la necesidad de que los usuarios tengan credenciales estáticas. En su lugar, los usuarios se autentican en un servidor mediante un token de corta duración o un par de llaves públicas y privadas que Check Point emite y gestiona. Las llaves rotan periódicamente y se pueden revocar manualmente en cualquier momento al denegar el acceso instantáneamente.

NEW: VPN-as-a-Service
with Zero Trust

Secure any employee, third party or DevOps user with a choice of
application or network level access.

DESCARGUE LA FCHA DE DATOS VER VIDEO

Eliminate Static Keys

Check Point’s built-in PAM solution allows users to log-in using their authenticated identity, eliminating the need to hold SSH keys or VPN credentials.

Lea más

Server Auto-Enrollment

Check Point seamlessly integrates with your cloud provider to automatically enroll servers and their tags to the platform.

Lea más

Visibility on All Commands

Get a complete audit trail of user activity, including executed SSH commands and recorded RDP sessions. Audit logs are tied to users’ accounts and devices and can be exported to your SIEM for additional contextual data.

Lea más

Our Fresh Approach to Server Access

Check Point’s Comprehensive Feature Set

Built-in PAM

Check Point’s built-in PAM solution eliminates the risk associated with users holding static credentials. Users authenticate to a server using either a short-lived token or a public-private key pair, both of which are issued and managed through Check Point. The keys are rotated periodically and can be manually revoked at any time, instantly cutting off all access.

Total Visibility

Get a complete audit trail of user activity, including executed SSH commands and recorded RDP sessions. Audit logs are tied to users’ accounts and devices and can be exported to your SIEM for additional contextual data.

SSH and RDP

Check Point integrates natively with SSH and RDP protocols, providing users with a quick and secure connection to any server or environment through their terminal and providing administrators with a complete audit trail of user activity, including executed SSH commands and recorded RDP sessions. This is done without any need for additional plugins.

IDP Integration

Check Point integrates with your IDP and leverages user identities for authentication and to provide centralized privileged access management on both Linux and Windows servers. This includes Okta, OneLogin, Azure AD and Keycloak.

Auto-Enrollment

Check Point seamlessly integrates with your cloud provider to automatically enroll servers and their tags to the platform, creating continuous sync with your Check Point account. This provides for easy onboarding, tag management, and the seamless operation of autoscaled services.

Real-Time Security

Provide granular, contextual access, monitoring all user activity, and terminate user sessions in real-time based on suspicious behavior.

Ready to Experience Corporate Access?

We’re here to help. Contact us to learn more about clientless, cloud-delivered SASE technology.

Solicite precios

ENCUENTRE UN SOCIO

x
  Comentarios
Este sitio web utiliza cookies para optimizar su funcionalidad y para fines de análisis y marketing.Al seguir usando este sitio web, usted acepta el uso de cookies.Para obtener más información, lea nuestro Aviso de cookies.