Compliance Your Automated Trusted Advisor - Check Point Software

Transcription

Compliance DatasheetComplianceYour Automated Trusted AdvisorBoost your security level across your entire CheckPoint environment with a dynamic solution thatcontinuously monitors your security infrastructure,gateways, technologies, policies and configurationsettings all in real time.Security ComplianceKey Features and Benefits 300 Check Point Security BestPractices optimizing configurationsettings ensuring businesses staysecure Monitor policy changes in real time,providing instant alerts andremediation tips Translates thousands of complexregulatory requirements intoactionable Security Best PracticesINCREASE SECURITYAVOID HUMAN ERRORCOMPLY WITH REGULATIONS“Check Point Security Compliance makes it easy for us to apply the best practices we need tomeet our HIPAA requirements. It not only provides great protection, but it also demonstrates ourcommitment to security, which can make a huge difference if our organization is audited.”- Felix Castro, Director of IT, ICS 2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] November, 20211

Compliance DatasheetTOP TIER VIEWSSecurity OverviewRegulation DetailsSecurity Violations 2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] November, 2021Security by ModuleIntegrated with SmartEventReporting2

Compliance DatasheetSECURITY BEST PRACTICESCheck Point Compliance examines your environment’s security gateways, software modules,policies and configuration settings in real-time. With over 300 Security Best Practices, Compliancedetects poor configurations and provides instant remediation tips to ensure your business stayssecure. Compliance enables your security teams to reach the full potential of all of their CheckPoint products by recommending adjustments to security configurations in order to meet regulatoryand Security Best Practices in place.NEW GAIA USER BEST PRACTICESCreate best practices by running scripts over GAiA OS on the gateways.REGULATIONS & GDPRCheck Point Compliance provides best practices that are mapped to industry-known regulationswith clear requirements and recommendations laid out. Easily categorize by protections in place, orby severity of the security violation.Compliance with the General Data Protection Regulation (GDPR) will require a focus on howprivacy and data protection are addressed in the handling of information, but also on related areassuch as awareness, incident management and achieving “data protection by design”.Though GDPR is not a security-based regulation, there are aspects related to data protection andthe security of an enterprise. Hence, Check Point family of technologies and products can be of abenefit to such enterprises when designing the data protection guidelines of the organization basedon the data protection policy. Check Point Compliance contains several GDPR requirements thatcan be covered easily by configuring Check Point products accordingly. 2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] November, 20213

Compliance DatasheetSPOTLIGHTAutomated Trusted AdvisorCheck Point Compliance governs multiplesoftware technologies within the CheckPoint protection suite and can provide awide view of your compliance level. Youcan even activate SmartEvent forenhanced reporting capabilities.SecurityComplianceSecurity BestPracticesWith continuousmonitoring, avoidhuman errors andlower the complexity ofmanaging cybersecurity with the abilityto go from view toaction. Createoverviews and reportsin real-time andmanage it all through asingle pane of glass.Filter security bestpractices by softwaremodule. You can viewthe relevant objectsthe best practiceapplies to as well asthe relevant regulatoryrequirements. Takeaction immediately orschedule the action tooccur at a later date.Creating aBest PracticeRegulatoryComplianceFine tune andmonitor what’simportant to you.Easily optimize yoursecurity bestpractices or createand enforce yourown best practicescompany-wide.You can see yoursecurity level inaccordance to directregulations such asHIPAA, GDPR, PCIDSS, ISO 27001 andmany more.Step Up to 5th Generation Cyber SecurityGen V security leaves the patchwork and best-of-breed deployments of the past behind.Instead, it’s characterized by an architecture that unifies all networks, cloud, and mobiledevices, supported by real time threat intelligence. 2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] November, 20214

Compliance DatasheetORDERING COMPLIANCE# of Managed GatewaysSmart-1 Appliances Bundled with Compliance1Compliance SmartEvent for Smart-1Compliance and SmartEvent Annual subscription isincluded with every new Smart-1 appliance purchase.Extend your license with the annual subscription SKUsbelowSKUAppliance5 - 10Smart-1 600-SCPAP-NGSM600S-BASECPAP-NGSM600S-PLUS25 - 50Smart-1 600-MCPAP-NGSM600M-BASECPAP-NGSM600M-PLUS75 - 150Smart-1 6000-LCPAP-NGSM6000L-BASECPAP-NGSM6000L-PLUS200 - 400Smart-1 ECPAP-NGSM6000XL-PLUSMGMTCPAP-NGSM6000XL-PLUSOpen Server Bundled withCompliance1Compliance SmartEvent for Open Server5CPSM-NGSM5Every Open Server license includes SmartEvent andCompliance for the 1st year. Extend your license with theannual subscription SKUs 0-MD5Compliance AnnualSubscription1Compliance and SmartEvent subscription bundle forsingle domain environmentsComplianceCompliance 0-1Y50 Extension2CPSB-COMP-EXT-50-1Y2 CPSB-COMP-EXT-50-1Y21 Extend your 1 Year Compliance Smart-1 license by 1 Year. 2Y and 3Y licenses are also available in the online product catalog. SmartEvent annual EVSlicense (such as CPSB-EVS-10-1Y) - can be used only on top of the new NGSM license (CPAP-NGSMXXX or CPSM-NGSMXXX).2 50 SKU can be used on top of 150 GW licenses. 2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] November, 20215

Compliance DatasheetORDERING COMPLIANCE (continued)# of Managed GatewaysSKUCompliance subscription extension25CPSB-COMP-MDM25GW-1Y*For Multi-Domain environments: SmartEvent runs on adedicated 1000CPSB-COMP-MDM1000GW-1YCompliance for Multi-Domain EnvironmentCONTACT USEMAIL: INFO@CHECKPOINT.COM 2021 Check Point Software Technologies Ltd. All rights reserved. [Protected] November, 2021WEB: WWW.CHECKPOINT.COM6

With over 300 Security Best Practices, Compliance detects poor configurations and provides remediation tips to ensure\ your business stays secure. Keywords: Compliance, Regulatory Compliance, Security Management, Security Best Practice Created Date: 11/8/2021 8:06:38 AM