©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point...

Post on 31-Dec-2015

217 views 1 download

Tags:

transcript

©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

SmartWorkflowChange Management Software BladeSmartWorkflowChange Management Software Blade

2©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

AgendaAgenda

Changing Business Needs Why Change Management? Introducing SmartWorkflow Summary

3©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Gateways

Risk to Security Risk to Compliance Risk to Performance Risk to Network Uptime

Changing Business NeedsChanging Business Needs

IT Administrators

MultiplePolicy Changes

MultiplePolicy Changes

Business Needs

ConstantStream ofChange Requests

Multiple and frequent changes to security policies often lead to mis-configurations and security risks

4©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

VISIBILITY AND CONTROL

Why Change Management?Why Change Management?

COMPLIANCE

MITIGATE RISKS

5©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Introducing SmartWorkflow Software BladeIntroducing SmartWorkflow Software Blade

Automated Policy Change Management

6©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

SmartWorkflow Life CycleSmartWorkflow Life Cycle

7©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Introducing SmartWorkflowIntroducing SmartWorkflow

Single Management Console

Improves security and efficiency while reducing costs

Visual change trackingReduces risk of security policy

configuration errors

Flexible authorizationConforms to established approval

processes

Comprehensive audit and reporting

Enhances compliance by tracking evolution of policy changes

Automated Policy Change Management

8©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Edit PoliciesEdit Policies

Changes Highlighted in SmartDashboard Make and visualize changes in SmartDashboard

Policy changes are made directly in the console and highlighted for better tracking

NewObject

ChangeHighlighted

9©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Easy review of changes with side by side difference report

Review ChangesReview Changes

Policy BEFORE change Policy AFTER Change

10©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Approve ChangesApprove Changes

Review and Approve ChangesChanges Highlighted in SmartDashboardHighlighted changes promote easy approval

process and reduce errors

APPROVED!

AddedObject

ChangedPolicy

11©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Flexible Authorization

Configuration Options:

Role-based approval

Self Approval

Emergency Bypass

Conforms to an organization’s existing approval process

12©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Audit TrailsAudit Trails

Who?

Audit Trail

What? When? How? Why?

Review and Approve ChangesChanges Highlighted in SmartDashboardTracks evolution of policy changes and all necessary details for regulatory compliance

13©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

SmartWorkflow SummarySmartWorkflow Summary

Single Console Integration

Visual change tracking

Flexible authorization

Audit trails

Automated Policy Change Management