Download presentation
Presentation is loading. Please wait.
Published byRuby Tyler Modified over 9 years ago
1
©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change Management Software Blade
2
2 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Agenda Changing Business Needs Why Change Management? Introducing SmartWorkflow Summary
3
3 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Gateways Risk to Risk to Security Risk to Risk to Compliance Risk to Risk to Performance Risk to Risk to Network Uptime Changing Business Needs IT Administrators Multiple Policy Changes Multiple Policy Changes Business Needs Constant Stream of Change Requests Multiple and frequent changes to security policies often lead to mis-configurations and security risks
4
4 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties VISIBILITY AND CONTROL Why Change Management? COMPLIANCE MITIGATE RISKS
5
5 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Introducing SmartWorkflow Software Blade Automated Policy Change Management Automated Policy Change Management
6
6 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Life Cycle
7
7 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Introducing SmartWorkflow Single Management Console Improves security and efficiency while reducing costs Visual change tracking Reduces risk of security policy configuration errors Flexible authorization Conforms to established approval processes Comprehensive audit and reporting Enhances compliance by tracking evolution of policy changes Automated Policy Change Management
8
8 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Edit Policies Changes Highlighted in SmartDashboard Make and visualize changes in SmartDashboard Policy changes are made directly in the console and highlighted for better tracking New Object Change Highlighted
9
9 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Easy review of changes with side by side difference report Review Changes Policy BEFORE changePolicy AFTER Change
10
10 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Approve Changes Review and Approve Changes Changes Highlighted in SmartDashboard Highlighted changes promote easy approval process and reduce errors APPROVED! Added Object Changed Policy
11
11 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Flexible Authorization Configuration Options: Role-based approval Self Approval Emergency Bypass Conforms to an organization’s existing approval process
12
12 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Audit Trails Who? Audit Trail What? When?How? Why? Review and Approve Changes Changes Highlighted in SmartDashboard Tracks evolution of policy changes and all necessary details for regulatory compliance
13
13 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Summary Single Console Integration Visual change tracking Flexible authorization Audit trails Automated Policy Change Management
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.