We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byFelicity Manley
Modified over 2 years ago
©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 3D Security Analysis Report Tool
2 2©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Introducing a simple and powerful sales tool promoting Check Point 3D Software Blades strategy Introducing a simple and powerful sales tool promoting Check Point 3D Software Blades strategy
3 3©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | 3D Security Analysis Report tool
4 4©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Agenda 1 Introduction 2 Installation 3 The Report 4 Delivery
5 5©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | 3D Security Tool Presents security events and proposes remediation steps Uses Mirror Port or connect inline Supports offline log data analyzing Out-of-the-box and customizable reports Deployment with appliance or laptop Based on real customer data Automatically generates comprehensive security analysis reports without disrupting the network
6 6©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Simple 2 steps installation Install Supplement 2 Install New SmartConsole 1 Security Getaway Security Management SmartEvent R75.20 Deployment: Appliances, Open Server or VM Included in R75.20 Mirror Port Kit
7 7©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Mirror Port
8 8©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Report content EXECUTIVE SUMMARY FINDINGS Intrusion Prevention Events Web Security Events Data Loss Prevention APPENDIX REMEDIATION
9 9©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | How to generate report? You will need a special SmartEvent version (that includes this capability) One Click!
10 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Report reflection Including Customer info, Executive Summary and recommended Remediation Clear Executive Summary Visual Reflection of your findings Summary of Top Events Recommended Remediation
11 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |
12 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Simple localization
13 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Delivery Method (recommendation) Once report is finalized, convert to PDF Share the report with the customer (password protected) Conduct mutual discussion with customer pointing key findings: –Discuss the results –Discuss the evaluation phase and blades used –Explain the simplicity of obtaining security with 3D Conclude the meeting by discussing next steps by promoting 3D Software Security Blades
14 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Tips for POC using mirror port
15 ©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. | Availability Check Point PartnerMAP Tutorial Video Tool download User Guide And more 02:47
Slide 1 Insert your own content. Slide 2 Insert your own content.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Visibility & Control – Identity, Application & Content Awareness.
MAXIMIZE WEBFOCUS GO MOBILE! Copyright 2010, Information Builders. Slide 1 Brian Carter 3/21/12.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
SVQs Business and Administration Launch Events January/February 2011.
Addition 1’s to
Bottoms Up Factoring. Start with the X-box 3-9 Product Sum
Addition Facts = = =
How to Backup your Encrypted Files A comprehensive guide on how to encrypt your most private files and upload them to a back-up server.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone SmartEvent (Intro) Антон Разумов Консультант по безопасности.
IQuote User Guide (1.2) Use your portal username and password
Vantage Report 3.0 Product Sales Guide Yvonne Wu Product Marketing & Management Network Security & Application Division ZyXEL Communications Corp. Sept.
17 Copyright © 2005, Oracle. All rights reserved. Deploying Applications by Using Java Web Start.
1 CS 446 – Tutorial 6 Frid. Nov. 6 th, 2009 Implementation Tutorial.
WEEK 1 You have 10 seconds to name…
1 Welcome to JCCAA Data base presentation Click box to see the DEMO 1.JCCAA Web Site 2. Member Login 3. My Acount 4. School DBA The end.
CustomSource Online Tutorial. 2 © 2009 Fiserv, Inc. or its affiliates. Welcome to Fiserv. By now, you should have already received an containing.
Jack Malloch Product Service Advisor Global Support Services.
HOW TO USE … SAMIEEE FOR VOLUNTEER POSITIONS WITH AUTOMATIC ACCESS.
Company Confidential Registration Management Committee (RMC) 1 OP Assessor Workshop: OASIS Update Bryan Blunt Other Party (OP) Assessor Workshop San Diego,
1 PLAY 60 Challenge Online Tracker. 2 Introduction The PLAY 60 Challenge Online Tracker is a web based physical activity tracker teachers across the country.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
ALSMS Upgrade Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
TECHcommunity March 2012 Collaborate, Connect, Contribute, Catch up & Customize.
©2011 Quest Software, Inc. All rights reserved.. Andrei Polevoi, Tatiana Golubovich Program Management Group ActiveRoles Add-on Manager Overview.
DISTRICT AND SCHOOL ASSESSMENT & TECHNOLOGY COORDINATOR ONLINE TESTING WEBINAR FEBRUARY 7 AND 9, 2012 Washington Online Testi ng OSPI Office of Superintendent.
The Social Buddies Application Jalele Achour External Consultant in Social CRM Powered by.
SADC Course in Statistics Excel for statistics Module B2, Session 11.
CS4026 Formal Models of Computation Running Haskell Programs – power.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Eligibility, Benefits, and Pre-certifications Availity Customer Connection 2011 ©2011 Availity, LLC | All Rights Reserved 1 Rev
Web Center Certification Administration Web Center Certification Training Intuit Financial Services University.
IWDS – Extensive Training for Case Managers /06/2004.
Copyright (C) SIMCOM Software Pty Ltd - ALL rights reserved 1 Foreword SIMDIR was created for management, since the birth of PCs, the problem.
System Overview Chapter 1. System Overview 1-2 Objectives Understand Overall Schematic Review Phase 2 Be aware of technical recommendations for new system.
Copyright © Open Text Corporation. All rights reserved. Slide 1 Automatic Routing With Captaris FaxPress and FaxPress Premier Darin McGinnes Sales Engineer.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
ST/PRM3-EU | | © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying.
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
Combining Like Terms. Only combine terms that are exactly the same!! Whats the same mean? –If numbers have a variable, then you can combine only ones.
Introduction to Web Bill of Lading Q Proprietary and Confidential Copyright © 2005 INTTRA Inc. 2 Agenda Industry Challenges INTTRA Solution Value.
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Electronics-line.com My ELAS December electronics-line.com Business Propositions All customers would like to have the advantages ELAS gives A large.
1 Creating a Data Backup Oakland University University Relations Updated - June 2006.
Designed for your needs ANI Voice Communications Designed for your needs Audio Conferencing Message Delivery TeamConnect.
FLIK International at RHQ proudly introduces 1 Available here: https://toysrus.catertrax.com/
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 2.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
© 2017 SlidePlayer.com Inc. All rights reserved.