Zero Trust Server Access

Securely connect to Linux and Windows servers over SSH and RDP through Check Point’s built-in privileged access management (PAM) solution that eliminates the risk associated with holding static credentials.

데모 요청하기

The Most Secure Way to Manage Privileged Access

서버에 대한 권한 있는 액세스를 보호하는 것은 전통적으로 키 관리에 중점을 두었습니다. 하지만 대규모로 키를 관리, 추적, 회전하는 것은 거의 불가능한 작업입니다. 인증정보 도용은 여전히 가장 효율적이고 효과적인 공격 벡터 중 하나이며, 기업 4곳 중 3곳은 SSH 관리가 잘못되어 루트 수준의 공격에 취약합니다.

체크포인트의 제로 트러스트 아키텍처는 사용자가 정적 자격 증명을 보유할 필요가 없도록 설계된 기본 제공 PAM 솔루션을 통해 서버에 대한 권한 액세스를 보호합니다. 대신, 사용자는 수명이 짧은 토큰 또는 공개-비공개 키 쌍을 사용하여 서버에 인증하며, 이 두 가지 모두 체크포인트를 통해 발급 및 관리됩니다. 키는 주기적으로 교체되며 언제든지 수동으로 취소하여 모든 액세스를 즉시 차단할 수 있습니다.

NEW: VPN-as-a-Service
with Zero Trust

Secure any employee, third party or DevOps user with a choice of
application or network level access.

데이터시트 다운로드 동영상 시청하기

Eliminate Static Keys

Check Point’s built-in PAM solution allows users to log-in using their authenticated identity, eliminating the need to hold SSH keys or VPN credentials.

자세히 알아보기

Server Auto-Enrollment

Check Point seamlessly integrates with your cloud provider to automatically enroll servers and their tags to the platform.

자세히 알아보기

Visibility on All Commands

Get a complete audit trail of user activity, including executed SSH commands and recorded RDP sessions. Audit logs are tied to users’ accounts and devices and can be exported to your SIEM for additional contextual data.

자세히 알아보기

Our Fresh Approach to Server Access

Check Point’s Comprehensive Feature Set

Built-in PAM

Check Point’s built-in PAM solution eliminates the risk associated with users holding static credentials. Users authenticate to a server using either a short-lived token or a public-private key pair, both of which are issued and managed through Check Point. The keys are rotated periodically and can be manually revoked at any time, instantly cutting off all access.

Total Visibility

Get a complete audit trail of user activity, including executed SSH commands and recorded RDP sessions. Audit logs are tied to users’ accounts and devices and can be exported to your SIEM for additional contextual data.

SSH and RDP

Check Point integrates natively with SSH and RDP protocols, providing users with a quick and secure connection to any server or environment through their terminal and providing administrators with a complete audit trail of user activity, including executed SSH commands and recorded RDP sessions. This is done without any need for additional plugins.

IDP Integration

Check Point integrates with your IDP and leverages user identities for authentication and to provide centralized privileged access management on both Linux and Windows servers. This includes Okta, OneLogin, Azure AD and Keycloak.

Auto-Enrollment

Check Point seamlessly integrates with your cloud provider to automatically enroll servers and their tags to the platform, creating continuous sync with your Check Point account. This provides for easy onboarding, tag management, and the seamless operation of autoscaled services.

Real-Time Security

Provide granular, contextual access, monitoring all user activity, and terminate user sessions in real-time based on suspicious behavior.

Ready to Experience Corporate Access?

We’re here to help. Contact us to learn more about clientless, cloud-delivered SASE technology.

지금 사용해 보기

데모 요청하기

전문가와 상담하기

세일즈팀에 문의하기

가격 문의

파트너 찾기

×
  피드백
본 웹 사이트에서는 기능과 분석 및 마케팅 목적으로 쿠키를 사용합니다.웹 사이트를 계속 이용하면 쿠키 사용에 동의하시게 됩니다. 자세한 내용은 쿠키 공지를 읽어 주십시오.