Today’s security devices generate voluminous amounts of data that can make it difficult to understand if your systems have been compromised. Next-Generation SmartEvent consolidates monitoring, logging, reporting and event analysis in a single console—to bring you comprehensive, easy-to-understand threat visibility. So, rather than drown in the deluge of data, your security team can focus their efforts on the critical threats.
Reduce data to be reviewed and quickly isolate threats
Easily investigate and mitigate threats
Consolidated monitoring for all security threats
With more than 50 Check Point gateways deployed around the world, the Check Point management solution gives us a single view of our universe through a central console. This enables us to manage our entire infrastructure with two local administrators and keep labor costs extremely low.
IT Security Manager
Is there a real threat and what is the scope?
Next-Generation SmartEvent allows you to create custom dashboards to monitor only what is relevant to your organization. Widgets and chart templates optimize visual display, making security data easy to understand at a glance.
How do I stop it from happening again?
You can take advantage of predefined security events or customize them to prioritize events so automatic alerts are generated alerts for noteworthy, critical events.
Did that malware hit my network?
SmartEvent enables one-click exploration of security events. With one click, move from a high-level overview to specific details such as type of attack, timeline, application type and source. Free-text search allows you to enter specific search terms to retrieve results from millions of logs in seconds.
What do I do now to respond to that critical event?
With SmartEvent, once you have investigated an event, it’s easy to act on it. Depending on the severity of the event, you can choose to ignore it, act on it later, or block it immediately. You can also easily toggle over to the rules associated with the event to refine your policy.
SmartEvent correlates logs from all Check Point enforcement points, including end-points, to identify suspicious activity from the clutter. Rapid data analysis and custom event logs immediately alert administrators to anomalous behavior such as someone attempting to use the same credential in multiple geographies simultaneously.
SmartEvent makes it easy to customize reports for the different stakeholders in your company. Your CISO might need an overview of high risk events in the last month, while your HR Manager might need to know where employees are going online. With SmartEvent, your reports display only content that is relevant to each stakeholder.
With a large number of pre-defined, but easily customizable security events, you can have SmartEvent up and running and detecting threats in a matter of hours.
And, you can stay on top of security while on the go. The Next Generation SmartEvent web portal provides access to reports and dashboard data via mobile phones and tablet devices.
|Protocol/Application Support||500 plus protocol types|
|VoIP Protection||SIP, H.323, MGCP and SIP with NAT support|
|Network Address Translation||Static/hide NAT support with manual or automatic rules|
|DHCP Gateways||Security gateways can have dynamic IP addresses|
|VLAN||Up to 256 VLANs per interface|
|Link Aggregation||802.3ad passive and 802.3ad active|
|Bridge Mode / Transparent Mode||Inspect traffic without interfering with the original IP routing|
|Extensive Set of Policy Objects||Individual node, networks, groups, dynamic objects|
|IP Versions||IPv4 and IPv6|
|Fail-Safe Protections||Default filter provides protection during boot time and prior to initial policy|
|Secure Internet Communications (SIC)||Certificate-based secure communications channel among all Check Point distributed components belonging to a single management domain|
|Multiple Authentication Methods||User authentication, client authentication, session authentication|
|Local Users||Local database user store included|
|RADIUS and RADIUS Groups||Multiple servers and MS-CHAPv2, MS-PAP methods|
|LDAP and LDAP Groups||Microsoft Active Directory, Novell Directory Server, Red Hat Directory Server, OPSEC certified LDAP server|
|X.509 Certificates||Supported using the included Certificate Authority or third party CAs|
|Customizable Authentication Messages||Supported|