1
THREAT ANALYSIS REPORT CLOUD SERVICE SECURITY CHECKUP Check Point Security Checkup Cloud Service What are the benefits? Easier and shorter sales cycle by saving Partner/SE time to generate and analyze the security findings Better HW performance as there is no need to install SmartEvent server on the on-site monitoring device Save HW costs as a smaller HW can be used to monitor traffic (for example: a smaller Check Point appliance model or even a laptop in small organizations) Verified and proven report output as the security findings are being analyzed by Check Point HQ security expects How does it work? 1. Partner/SE sets up a Check Point standalone gateway with relevant Security and Management Software Blades activated. SmartEvent server is not required. 2. Partner/SE plugs the device into the customer network to inspect mirrored or inline traffic (recommended monitoring duration: at least 1 week) 3. After monitoring is done, Partner/SE sends the security log file(s) to the Security Checkup Cloud Service using an automated tool. 4. Report is generated in the Check Point Cloud, analyzed and reviewed by Check Point’s experts and sent back to the Partner/SE. Is it secured to send logs to the Check Point Security Checkup cloud service? Encrypted logs are sent using a secured file transfer protocol (SFTP) and kept protected in a secured cloud environment. The logs will be automatically deleted after a short period of time. Do I need to have a valid User Center/PartnerMAP account to use this service? Yes, as this service is provided exclusively to Check Point Partners and SEs, before logs are sent you will be required to authenticate using your User Center/PartnerMAP account credentials. How can I start using the service? Search for the Security Checkup Cloud Service at PartnerMAP for instructions. The service is free of charge. For any question please send an email to [email protected]. Check Point introduces the new Security Checkup Cloud Service. The purpose of this service is to make the process of running a Threat Analysis Report easier for our Partners and SEs by generating a report in the cloud rather than on an on-site monitoring device. The service is free of charge. Partner/SE sets up a Check Point standalone gateway with relevant Security Software Blades 1 Device is plugged into the customer network to inspect mirrored or inline traffic 2 Security Gateway log file(s) are sent to the Check Point Cloud using an automated tool 3 Report is generated in the Check Point Cloud, analyzed and reviewed by Check Point experts and sent to the Partner/SE 4 4 EASY STEPS TO DELIVERING A CHECKUP CLOUD SERVICE www.checkpoint.com ©2014 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties

SecurityCheckupCloudService-V05

Embed Size (px)

DESCRIPTION

guia checkpoint

Citation preview

Page 1: SecurityCheckupCloudService-V05

THREAT ANALYSIS REPORT

CLOUD SERVICE

SECURITY CHECKUP

Check Point Security Checkup Cloud Service

What are the benefits?• Easier and shorter sales cycle by saving Partner/SE time to generate and analyze the security findings • Better HW performance as there is no need to install SmartEvent server on the on-site monitoring device • Save HW costs as a smaller HW can be used to monitor traffic (for example: a smaller Check Point appliance model or

even a laptop in small organizations)• Verified and proven report output as the security findings are being analyzed by Check Point HQ security expects

How does it work? 1. Partner/SE sets up a Check Point standalone gateway with relevant Security and Management Software Blades

activated. SmartEvent server is not required. 2. Partner/SE plugs the device into the customer network to inspect mirrored or inline traffic (recommended monitoring

duration: at least 1 week) 3. After monitoring is done, Partner/SE sends the security log file(s) to the Security Checkup Cloud Service using an

automated tool. 4. Report is generated in the Check Point Cloud, analyzed and reviewed by Check Point’s experts and sent back to the

Partner/SE.

Is it secured to send logs to the Check Point Security Checkup cloud service? Encrypted logs are sent using a secured file transfer protocol (SFTP) and kept protected in a secured cloud environment. The logs will be automatically deleted after a short period of time.

Do I need to have a valid User Center/PartnerMAP account to use this service?Yes, as this service is provided exclusively to Check Point Partners and SEs, before logs are sent you will be required to authenticate using your User Center/PartnerMAP account credentials.

How can I start using the service?Search for the Security Checkup Cloud Service at PartnerMAP for instructions. The service is free of charge. For any question please send an email to [email protected].

Check Point introduces the new Security Checkup Cloud Service. The purpose

of this service is to make the process of running a Threat Analysis Report easier for

our Partners and SEs by generating a report in the cloud rather than on an on-site

monitoring device. The service is free of charge.

Partner/SE sets up a Check Point standalone gateway with relevant Security Software Blades

1

Device is plugged into the customer network to inspect mirrored or inline traffic

2

Security Gateway log file(s) are sent to the Check Point Cloud using an automated tool

3

Report is generated in the Check Point Cloud, analyzed and reviewed by Check Point experts and sent to the Partner/SE

4

4 EASY STEPS TO DELIVERING A CHECKUP CLOUD SERVICE

www.checkpoint.com©2014 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties