1 / 15

3D Security Analysis Report Tool

3D Security Analysis Report Tool. 3D Security Analysis Report Tool. 3D Security Analysis Report Tool. Introducing a simple and powerful sales tool promoting Check Point 3D Software Blades strategy. 3D Security Analysis Report tool. Live environment. 3D Report. 3D Security

lucian
Download Presentation

3D Security Analysis Report Tool

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 3D Security Analysis Report Tool 3D Security Analysis Report Tool 3D Security Analysis Report Tool

  2. Introducing a simple and powerful sales tool promoting Check Point 3D Software Blades strategy

  3. 3D Security Analysis Report tool Live environment 3D Report 3D Security Analysis Tool

  4. Agenda 1 2 3 4 Installation Delivery The Report Introduction

  5. 3D Security Tool Presents security events and proposes remediation steps Uses Mirror Port or connect inline Supports offline log data analyzing Out-of-the-box and customizable reports Deployment with appliance or laptop Based on real customer data Automatically generates comprehensive security analysis reports without disrupting the network

  6. Simple 2 steps installation 1 2 Install New SmartConsole Install Supplement R75.20 Security Getaway SmartEvent Security Management • Deployment: Appliances, Open Server or VM • Included in R75.20 Mirror Port Kit

  7. Can be used on laptop with Vmware! Vmware Workstation 4. Generate Security Analysis Report 1. Install VMware on a laptop/desktop 2. Run the kit’s Virtual Machine 3. Connect to a live Mirror Port Vmware Player (Free) R75.20 Network OR Mirror Port To Mirror Port

  8. Report content EXECUTIVE SUMMARY FINDINGS Data Loss Prevention Web Security Events Intrusion Prevention Events REMEDIATION APPENDIX

  9. How to generate report? You will need a special SmartEvent version (that includes this capability) One Click!

  10. Report reflection Clear Executive Summary Recommended Remediation Summary of Top Events Visual Reflection of your findings Including Customer info, Executive Summary and recommended Remediation

  11. Simple localization

  12. Delivery Method (recommendation) Once report is finalized, convert to PDF Share the report with the customer (password protected) Conduct mutual discussion with customer pointing key findings: Discuss the results Discuss the evaluation phase and blades used Explain the simplicity of obtaining security with 3D Conclude the meeting by discussing next steps by promoting 3D Software Security Blades

  13. Tips for POC using mirror port • Tap the interface facing the internet • Connect the laptop to the internet to get URL logs • To get user identity, connect the laptop/machine via another port to the Active Directory • To get mail related DLP event make sure that SMTP traffic is being transfered on your tapped interface.

  14. Availability Check Point PartnerMAP Tutorial Video Tool download User Guide And more 02:47

More Related