Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 3D Security Analysis Report Tool.

Similar presentations


Presentation on theme: "©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 3D Security Analysis Report Tool."— Presentation transcript:

1 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 3D Security Analysis Report Tool

2 2 2©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Introducing a simple and powerful sales tool promoting Check Point 3D Software Blades strategy Introducing a simple and powerful sales tool promoting Check Point 3D Software Blades strategy

3 3 3©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | 3D Security Analysis Report tool

4 4 4©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Agenda 1 Introduction 2 Installation 3 The Report 4 Delivery

5 5 5©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | 3D Security Tool Presents security events and proposes remediation steps Uses Mirror Port or connect inline Supports offline log data analyzing Out-of-the-box and customizable reports Deployment with appliance or laptop Based on real customer data Automatically generates comprehensive security analysis reports without disrupting the network

6 6 6©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Simple 2 steps installation Install Supplement 2 Install New SmartConsole 1 Security Getaway Security Management SmartEvent R75.20 Deployment: Appliances, Open Server or VM Included in R75.20 Mirror Port Kit

7 7 7©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Mirror Port

8 8 8©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Report content EXECUTIVE SUMMARY FINDINGS Intrusion Prevention Events Web Security Events Data Loss Prevention APPENDIX REMEDIATION

9 9 9©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | How to generate report? You will need a special SmartEvent version (that includes this capability) One Click!

10 10 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Report reflection Including Customer info, Executive Summary and recommended Remediation Clear Executive Summary Visual Reflection of your findings Summary of Top Events Recommended Remediation

11 11 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |

12 12 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Simple localization

13 13 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Delivery Method (recommendation) Once report is finalized, convert to PDF Share the report with the customer (password protected) Conduct mutual discussion with customer pointing key findings: –Discuss the results –Discuss the evaluation phase and blades used –Explain the simplicity of obtaining security with 3D Conclude the meeting by discussing next steps by promoting 3D Software Security Blades

14 14 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Tips for POC using mirror port

15 15 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Availability Check Point PartnerMAP Tutorial Video Tool download User Guide And more 02:47


Download ppt "©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 3D Security Analysis Report Tool."

Similar presentations


Ads by Google