Page 1
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties
Multi-Domain Management Software Blades
Introduction for Administrators
Page 2
22©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Agenda
1
2
Introduction to Multi-Domains
3
Introduction for Administrators
Summary
Page 3
33©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Easy and Affordable
Security Management Customer Needs
Better
Security
Stronger Security
Greater Simplicity
ConsolidateManagement
SegmentDomains
Consistent Global Policy
Page 4
44©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Multi Domains
Perimeter firewalls
Corporate branches
Internal firewalls
DMZ firewalls
Data center firewalls
Get Increased Flexibility and Simplicity
Segment your Security Management Environment into Smaller Virtual Domains
Segment your Security Management Environment into Smaller Virtual Domains
Page 5
55©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Get Increased Flexibility and Simplicity
Multi Domains
Perimeter firewalls
Corporate branches
Internal firewalls
Data center firewalls
DMZ firewalls
Segment your Security Management Environment into Smaller Virtual Domains
Segment your Security Management Environment into Smaller Virtual Domains
Page 6
66©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Eases the Way to Multi-Domain Security Management
Check Point Eases the Way to Multi-Domain Security Management
Introducing Check Point Multi-Domain Software Blades
Deploy multi-domain management simply and affordably
Achieve better securitywith consistent global policies
Maximize security by segmenting management in virtual domains
Page 7
77©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Delivering Virtual Security Management to Businesses of All Sizes
Delivering Virtual Security Management to Businesses of All Sizes
Multi-Domain Software Blades
Consistent global security policy for better security
Global Policy BladeSecurity Domain Software Blades
Segment your security management into multiple virtual domains
Common security baseline across multiple domains
Single configuration for VPN, firewall, IPS and other protections
Common objects can be shared across domains
Each security domain is independent
Similar functionality as a Security Management Server (SmartCenter) [own IP address]
Administered with a familiar interface SmartConsole
Page 8
88©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Eases the Way to Multi-Domain Security Management
Check Point Eases the Way to Multi-Domain Security Management
Introducing Check Point Multi-Domain Software Blades
Deploy multi-domain management simply and affordably
Achieve better securitywith consistent global policies
Maximize security by segmenting management in virtual domains
Page 9
99©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Granular Role-Based Administration
Define administrator access per management
domain
Maintain separation of duties and increase flexibility Maintain separation of duties and increase flexibility
Page 10
1010©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Role-Based Administrators
Click to add administrator Jane
Predefined roles
Once created, assign to domain(s)
Add domains to manage
Assign permission
after adding to domains
Administrator with full access to multiple domainsAdministrator with full access to multiple domains
First administrator created with full access to domains
Page 11
1111©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Role-Based Administrators
Right-click to assigndomain
Newly created administrator
Tom
Add single domain to manage
Assign Limited Access for Second AdministratorAssign Limited Access for Second Administrator
Create customized
roles
Easily change granular rights
Second administrator created with limited access
Page 12
1212©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
More Control with Multi-Domains
Centrally manage virtual management domains
Segmenting your environment across separate management domains
Segmenting your environment across separate management domains
Page 13
1313©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Click to add new domain
Easily Create a New Domain
Wizard Simplifies Creation of New DomainsWizard Simplifies Creation of New Domains
Domain nameEuropean_Offices
Flexible global object distribution
Global IPS profiles
Assign administrators
to domain
New domain Created
Page 14
1414©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Eases the Way to Multi-Domain Security Management
Check Point Eases the Way to Multi-Domain Security Management
Introducing Check Point Multi-Domain Software Blades
Deploy multi-domain management simply and affordably
Achieve better securitywith consistent global policies
Maximize security by segmenting management in virtual domains
Page 15
1515©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Get Better Security with a Consistent Global Policy
Easily Enforce a Common Security Baseline by Streamlining Global Rules Across Multiple Domains
Easily Enforce a Common Security Baseline by Streamlining Global Rules Across Multiple Domains
Centrally manage global
policies across
multiple domains
Page 16
1616©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global Firewall Policy
Global Policies
Domain Policies
Shared Baseline Security Policies
Assign global policies on domainFrom global policies
Page 17
1717©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global VPN Policy
Manage single global VPN
configuration for all domains
Targeted at simplified VPN mode
Single configuration across domains
Automates domain VPN configurations
Easily Manage VPN Policies Across Domains
Page 18
1818©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global IPS
Centrally Managed IPS
Manage single global IPS policy for all domains
Assign different profiles to various gateways
IPS protections are centrally managed
Multiple IPS profiles can be configured globally
Flexible domain assignment of IPS profiles
Further customization of protections in domain profile
Page 19
1919©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global Policy Assignment
Manage Single Global Security Policy for All Domains
Shared Global Security Policies
DMZPerimeter Branch offices
Virtual Management Domains
Page 20
2020©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global Policy Assignment
Strengthen Security with baseline policyStrengthen Security with baseline policy
Right click to assign policy
Simply choose policy to assign
to domain
Page 21
2121©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Eases the Way to Multi-Domain Security Management
Check Point Eases the Way to Multi-Domain Security Management
Introducing Check Point Multi-Domain Software Blades
Deploy multi-domain management simply and affordably
Achieve better securitywith consistent global policies
Maximize security by segmenting management in virtual domains
Page 22
2222©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Deployment Choices
Easily add to your existing security management
Global Policy and Security Domain Software Blades
Smart-1 Dedicated Appliance
Pre-configuredPlug-and-play
Multiple Deployment Options!
Page 23
2323©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Multi-Domain Security Management on Smart-1
Smart-1 50
Easy with Software blades
Centralized Management for
Multiple DomainsUp to 12 TB of
Integrated Storage
Smart-1 150
Page 24
2424©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Eases the Way to Multi-Domain Security Management
Check Point Eases the Way to Multi-Domain Security Management
Summary
Deploy multi-domain management simply and affordably
Achieve better securitywith consistent global policies
Maximize security by segmenting management in virtual domains
Page 25
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties
Thank you!
For more information, www.checkpoint.com