How can I help you? Start Chat

US Phone: 1-866-488-6691
International Phone: +44-2036087492

  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter

Software-Defined Protection (SDP)

The bad guys innovate rapidly. To stay ahead of threats, you need a modern security infrastructure designed for today’s dynamic networks. Check Point’s Software-Defined Protection (SDP) is a leap forward in security architecture, providing collaborative threat intelligence with a modular, agile infrastructure that most importantly, is secure.


Protect  Your Organization with Three Interconnected Layers

MANAGEMENT LAYER
Integrates security with business processes

  • Modularity
  • Centralized visibility
  • Automation and orchestration

 

CONTROL LAYER
Delivers real-time protections to the enforcement points

  • Threat intelligence
  • Access control
  • Data protection based on classification

 

ENFORCEMENT LAYER
Inspects traffic and enforces protections in well-defined segments

  • Segmentation
  • Centralized control
  • Infection prevention

 


Visibility for situation awareness and incident response

The SDP Management Layer provides security administrators with real-time visualization of security incidents. With this information they can enhance their incident response and overall insight into the network security posture. Because it is open and modular, the Management Layer provides administrators with a great deal of flexibility in definition and delegation of security


Enhanced control of policy enforcement

At the core of the SDP architecture, the Control Layer generates software-defined protections that adapt rapidly in the face of new threats and changing network configurations. It develops these protections using advanced threat intelligence and then deploys precision policy updates using the enforcement points created by the Enforcement Layer.


Enforcement points to prevent attack proliferation

The Enforcement Layer segments the network, grouping together elements that share the same policy and protection characteristics. Segmentation allows for modular protection, preventing attacks from proliferating within the network and establishing trusted channels in which authorized traffic can flow unimpeded.