©2009 check point software technologies ltd. all rights reserved. [confidential]—for check point...

13
Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parti SmartWorkflow Change Management Software Blade

Upload: ruby-tyler

Post on 31-Dec-2015

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

SmartWorkflowChange Management Software BladeSmartWorkflowChange Management Software Blade

Page 2: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

2©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

AgendaAgenda

Changing Business Needs Why Change Management? Introducing SmartWorkflow Summary

Page 3: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

3©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Gateways

Risk to Security Risk to Compliance Risk to Performance Risk to Network Uptime

Changing Business NeedsChanging Business Needs

IT Administrators

MultiplePolicy Changes

MultiplePolicy Changes

Business Needs

ConstantStream ofChange Requests

Multiple and frequent changes to security policies often lead to mis-configurations and security risks

Page 4: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

4©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

VISIBILITY AND CONTROL

Why Change Management?Why Change Management?

COMPLIANCE

MITIGATE RISKS

Page 5: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

5©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Introducing SmartWorkflow Software BladeIntroducing SmartWorkflow Software Blade

Automated Policy Change Management

Page 6: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

6©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

SmartWorkflow Life CycleSmartWorkflow Life Cycle

Page 7: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

7©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Introducing SmartWorkflowIntroducing SmartWorkflow

Single Management Console

Improves security and efficiency while reducing costs

Visual change trackingReduces risk of security policy

configuration errors

Flexible authorizationConforms to established approval

processes

Comprehensive audit and reporting

Enhances compliance by tracking evolution of policy changes

Automated Policy Change Management

Page 8: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

8©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Edit PoliciesEdit Policies

Changes Highlighted in SmartDashboard Make and visualize changes in SmartDashboard

Policy changes are made directly in the console and highlighted for better tracking

NewObject

ChangeHighlighted

Page 9: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

9©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Easy review of changes with side by side difference report

Review ChangesReview Changes

Policy BEFORE change Policy AFTER Change

Page 10: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

10©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Approve ChangesApprove Changes

Review and Approve ChangesChanges Highlighted in SmartDashboardHighlighted changes promote easy approval

process and reduce errors

APPROVED!

AddedObject

ChangedPolicy

Page 11: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

11©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Flexible Authorization

Configuration Options:

Role-based approval

Self Approval

Emergency Bypass

Conforms to an organization’s existing approval process

Page 12: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

12©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

Audit TrailsAudit Trails

Who?

Audit Trail

What? When? How? Why?

Review and Approve ChangesChanges Highlighted in SmartDashboardTracks evolution of policy changes and all necessary details for regulatory compliance

Page 13: ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties SmartWorkflow Change

13©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

SmartWorkflow SummarySmartWorkflow Summary

Single Console Integration

Visual change tracking

Flexible authorization

Audit trails

Automated Policy Change Management