Check Point Identity Awareness offers granular visibility of users, groups, and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.GET A FREE TRIAL
Increase visibility of user activities with a dynamic user-based policy
Prevents unauthorized access, while still allowing users to work remotely
Enable on any Check Point gateway and integrate with leading identity vendors
It is clear that username and passwords no longer prove the identity of a user. Access control to your valuable assets must be strengthened. Check Point Identity Awareness ensures access to your data is granted only to authorized users, and only after their identities have been strictly authenticated; using Single Sign-On, Multi-Factor Authentication, Context-aware policies and anomaly detection.
1 2017 Verizon DBIR
Easily add user, user group and machine identity intelligence to your security defenses. Identity Awareness monitors traffic while giving you insight into user and computer identities. This lets you enforce access and audit data based on identity.
Identity Awareness maps users and computer identities, allowing for access to be granted or denied based on identity. The Check Point Identity Collector agent installed on a Windows host acquires identities from sources including Microsoft Active Directory Domain Controllers and Cisco Identity Services Engine (ISE).
Obtain identity from:
Identity Awareness is integrated into the Check Point Infinity Architecture. It can be easily and rapidly deployed on existing Check Point Security Gateways to seamlessly integrate with multiple identity sources.
Intrusion Prevention, Anti-bot, Anti-virus, URL Filtering, URL Reputation, IP Reputation, Domain Reputation, Anti-phishing, Identity Awareness, DDoS
CPU-level Inspection, Malware DNA, Threat Emulation, Threat Extraction (CDR), Campaign Hunting (AI), Context Aware Detection (AI), Huntress (AI), Zero-phishing, Anti-ransomware, Account Takeover, Malware Evasion Resistance
Learn about latest emerging threats, malware trends and cyber security recommendationsDOWNLOAD FULL REPORT