Zero Trust Server Access

Securely connect to Linux and Windows servers over SSH and RDP through Check Point’s built-in privileged access management (PAM) solution that eliminates the risk associated with holding static credentials.

デモをリクエストする

The Most Secure Way to Manage Privileged Access

サーバへの特権アクセスを保護するにあたり、従来は鍵の管理が重要視されていました。 しかし、鍵の管理、トラッキング、ローテーションを大規模に行うことは困難です。 認証情報の窃取は依然として最も効率的かつ効果的な攻撃手法の1つであり、4社に3社はSSHの不適切な管理が原因でルート レベルの攻撃に対して脆弱な状態になっています。

チェック・ポイントのゼロ トラスト アーキテクチャは、組み込みのPAMソリューションによってサーバへの特権アクセスを保護し、ユーザによる静的な認証情報の保持を不要にします。 代わりに、サーバに対する認証には、チェック・ポイントが発行、管理する一時的なトークンと公開・秘密鍵ペアのいずれかが使用されます。 鍵は定期的にローテートされ、いつでも手動で取り消して、すべてのアクセスを即座に遮断することが可能です。

NEW: VPN-as-a-Service
with Zero Trust

Secure any employee, third party or DevOps user with a choice of
application or network level access.

データシートをダウンロード 動画を見る

Eliminate Static Keys

Check Point’s built-in PAM solution allows users to log-in using their authenticated identity, eliminating the need to hold SSH keys or VPN credentials.

詳細はこちら

Server Auto-Enrollment

Check Point seamlessly integrates with your cloud provider to automatically enroll servers and their tags to the platform.

詳細はこちら

Visibility on All Commands

Get a complete audit trail of user activity, including executed SSH commands and recorded RDP sessions. Audit logs are tied to users’ accounts and devices and can be exported to your SIEM for additional contextual data.

詳細はこちら

Our Fresh Approach to Server Access

Check Point’s Comprehensive Feature Set

Built-in PAM

Check Point’s built-in PAM solution eliminates the risk associated with users holding static credentials. Users authenticate to a server using either a short-lived token or a public-private key pair, both of which are issued and managed through Check Point. The keys are rotated periodically and can be manually revoked at any time, instantly cutting off all access.

Total Visibility

Get a complete audit trail of user activity, including executed SSH commands and recorded RDP sessions. Audit logs are tied to users’ accounts and devices and can be exported to your SIEM for additional contextual data.

SSH and RDP

Check Point integrates natively with SSH and RDP protocols, providing users with a quick and secure connection to any server or environment through their terminal and providing administrators with a complete audit trail of user activity, including executed SSH commands and recorded RDP sessions. This is done without any need for additional plugins.

IDP Integration

Check Point integrates with your IDP and leverages user identities for authentication and to provide centralized privileged access management on both Linux and Windows servers. This includes Okta, OneLogin, Azure AD and Keycloak.

Auto-Enrollment

Check Point seamlessly integrates with your cloud provider to automatically enroll servers and their tags to the platform, creating continuous sync with your Check Point account. This provides for easy onboarding, tag management, and the seamless operation of autoscaled services.

Real-Time Security

Provide granular, contextual access, monitoring all user activity, and terminate user sessions in real-time based on suspicious behavior.

Ready to Experience Corporate Access?

We’re here to help. Contact us to learn more about clientless, cloud-delivered SASE technology.

専門家に問い合わせる

営業担当者に問い合わせる

価格を確認する

パートナーを探す

×
  Feedback
このWebサイトでは、機能、分析、およびマーケティング上の目的でCookieを使用しています。本Webサイトの使用を継続した場合、Cookieの使用に同意したことになります。詳細については、Cookieについてのお知らせをご覧ください。
OK