160 likes | 424 Views
3D Security Analysis Report Tool. 3D Security Analysis Report Tool. 3D Security Analysis Report Tool. Introducing a simple and powerful sales tool promoting Check Point 3D Software Blades strategy. 3D Security Analysis Report tool. Live environment. 3D Report. 3D Security
E N D
3D Security Analysis Report Tool 3D Security Analysis Report Tool 3D Security Analysis Report Tool
Introducing a simple and powerful sales tool promoting Check Point 3D Software Blades strategy
3D Security Analysis Report tool Live environment 3D Report 3D Security Analysis Tool
Agenda 1 2 3 4 Installation Delivery The Report Introduction
3D Security Tool Presents security events and proposes remediation steps Uses Mirror Port or connect inline Supports offline log data analyzing Out-of-the-box and customizable reports Deployment with appliance or laptop Based on real customer data Automatically generates comprehensive security analysis reports without disrupting the network
Simple 2 steps installation 1 2 Install New SmartConsole Install Supplement R75.20 Security Getaway SmartEvent Security Management • Deployment: Appliances, Open Server or VM • Included in R75.20 Mirror Port Kit
Can be used on laptop with Vmware! Vmware Workstation 4. Generate Security Analysis Report 1. Install VMware on a laptop/desktop 2. Run the kit’s Virtual Machine 3. Connect to a live Mirror Port Vmware Player (Free) R75.20 Network OR Mirror Port To Mirror Port
Report content EXECUTIVE SUMMARY FINDINGS Data Loss Prevention Web Security Events Intrusion Prevention Events REMEDIATION APPENDIX
How to generate report? You will need a special SmartEvent version (that includes this capability) One Click!
Report reflection Clear Executive Summary Recommended Remediation Summary of Top Events Visual Reflection of your findings Including Customer info, Executive Summary and recommended Remediation
Delivery Method (recommendation) Once report is finalized, convert to PDF Share the report with the customer (password protected) Conduct mutual discussion with customer pointing key findings: Discuss the results Discuss the evaluation phase and blades used Explain the simplicity of obtaining security with 3D Conclude the meeting by discussing next steps by promoting 3D Software Security Blades
Tips for POC using mirror port • Tap the interface facing the internet • Connect the laptop to the internet to get URL logs • To get user identity, connect the laptop/machine via another port to the Active Directory • To get mail related DLP event make sure that SMTP traffic is being transfered on your tapped interface.
Availability Check Point PartnerMAP Tutorial Video Tool download User Guide And more 02:47