Know your gear
The Check Point Compliance Software Blade leverages decades of security expertise and an extensive knowledge of Check Point products and security settings. The Compliance Blade continuously scans the policy and configuration settings defined within the Check Point software blades, security gateways and security management, highlighting all of the configuration weaknesses and errors, and making them available for remediation. Embedded within the Compliance Blade is a library of security best practices that allow organizations to monitor and compare the Check Point environment against vendor and security recommendations. Companies can also create their own personalized firewall policy best practices as part of the ongoing monitoring and analysis.
The Compliance Blade validates all policy and configuration changes against best practices prior to the changes being installed, thereby enabling security managers to identify issues and problems in real time and before the policy is actually implemented. Companies can be continuously assured that their environment is secure and operating in line with vendor best practices. Audit and compliance reporting has never been easier, with simple reports enabling organizations to reduce the time and costs associated with proving that each specific configuration setting is defined correctly. This in turn frees up resources to focus on security management. The Compliance Software Blade is fully integrated into the Check Point Software Blade architecture, providing a complete view of security status across Check Point gateways and software blades. On-screen security alerts and pre-defined compliance reports enable organizations to reduce the time and costs associated with maintaining optimized security and audit preparation.
The Compliance Blade validates all policy and configuration changes against best practices prior to the changes being installed, thereby enabling security managers to identify issues and problems in real time and before the policy is actually implemented. Companies can be continuously assured that their environment is secure and operating in line with vendor best practices. Audit and compliance reporting has never been easier, with simple reports enabling organizations to reduce the time and costs associated with proving that each specific configuration setting is defined correctly. This in turn frees up resources to focus on security management. The Compliance Software Blade is fully integrated into the Check Point Software Blade architecture, providing a complete view of security status across Check Point gateways and software blades. On-screen security alerts and pre-defined compliance reports enable organizations to reduce the time and costs associated with maintaining optimized security and audit preparation.