Call a Specialist Today! (02) 9388 1741
Free Delivery! Free Delivery!

Check Point Identity Awareness Software Blade

The industry's strongest level of gateway security and identity awareness
Check Point Identity Awareness Software Blade


Check Point Identity Awareness offers granular visibility of users, groups, and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.


Overview:

Check Point Identity Awareness offers granular visibility of users, groups, and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.


Visibility

Visibility

Increase visibility of user activities with a dynamic user-based policy

Control

Control

Prevents unauthorised access, while still allowing users to work remotely

Easy to Deploy

Easy to Deploy

Enable on any Check Point gateway and integrate with leading identity vendors


The Importance of Access Roles

Role-based access control (RBAC) authorizes requests for network access based on an individual’s defined role. Practicing RBAC results in employees only having access to the information they need to perform their job duties. For example, access to sensitive data is only granted to employees in an organization who require this information in order to perform their specific job duties.

Employing RBAC improves operational efficiency and compliance. When an employee changes job positions, their access to data can be changed with a simple role switch. With clear roles defined, the IT department can clearly see and ensure that only approved roles are accessing sensitive data. Unfortunately, identities and devices are easily compromised. According to Verizon DBIR, 81% of data breaches involve stolen credentials. Security professionals are responding to these threats by shifting to a zero trust security approach where no device, user, workload, or system is trusted by default.

Trust No User or Device

Check Point Identity Awareness seamlessly integrates with leading IAM (Identity and Access Management) vendors to ensure access is only granted to authorised users from devices verified to be secure using anomaly detection and context-aware policies. Multifactor authentication, identity agents and user to IP address mapping from trusted third parties verify the identity of the user and add context to verify the user is connecting from a trusted device.

Trust No User or Device

Benefits:

Increases visibility of user activities

  • Centrally manage user access to company resources and Internet applications
  • Granular user-, group- and machine-based visibility and policy enforcement
  • Easily distinguish between employees and others, i.e., guests and contractors

Improves control of corporate resources

  • Granular access to data centers, applications and network segments by user, machine or location
  • Prevent unauthorised resource access, while allowing users work remotely
  • Prevent threats and data loss by restricting access to resources by users and devices

Easy to deploy in any organization

  • Integrated into Check Point Software Blade Architecture
  • Provides scalable identity sharing between gateways
  • Seamless Active Directory (AD) integration with multiple deployment options-Clientless, Captive Portal or Identity Agent

Features:

Dynamic, User-based Policy

Dynamic, identity-based policy provides granular visibility and control of users, groups and machines and is easier to manage than static, IP-based policy. In a single, unified console administrators define the objects once. When gateways see a connection for the first time, the IP is mapped to the user and group by querying the third party user directory. This dynamic user to IP mapping frees administrators from constantly updating the Check Point policy.

Configurable Access Roles

With Identity Awareness, you can easily add users, user groups, and machine identity intelligence to your security defenses. Unlike traditional firewalls that only use IP addresses to monitor traffic, Identity Awareness monitors traffic while giving your organization insight into user and computer identities. Access Role objects can include networks, users and user groups, machines and machine groups, as well as remote access clients.

Configurable Access Roles

Multiple User Identification Sources

Multiple User Identification Sources

Identity Awareness is comprised of multiple identity connectors that obtain identity from a variety of sources.

  • Terminal Servers
    Identities are acquired using agents installed on a Windows-based application server that hosts Terminal Servers, Citrix XenApp, and Citrix Xen Desktop services. These agents identify individual user traffic coming from Terminal Servers.
  • Identity Agents
    Identities are acquired using agents that are installed on the Endpoint computers.
  • Active Directory Query
    Identities are acquired seamlessly from Microsoft Active Directory WMI API.
  • RADIUS Accounting
    Identities are acquired from a RADIUS accounting client.
  • Identity Collector
    Identities are acquired using a multi-purpose agent installed on a Windows host. The agent uses APIs to connect to Microsoft Active Directory Domain Controllers, Cisco ISE servers, and NetIQ eDirectory LDAP servers. The agent can also parse syslog messages to extract identities from a syslog message.
  • Identity Web API
    Gives you a flexible method for creating identities and easily perform third party integrations

Identity Collector

Identity Awareness maps users and computer identities, allowing you to enforce access and audit data based on identity. The Check Point Identity Collector agent installed on a Windows host acquires identities from: Microsoft Active Directory Domain Controllers via the Windows Event Log API, Cisco Identity Services Engine (ISE) servers via the pxGrid API, and can parse identities from syslog and integrates with NetIQ eDirectory.

Browser-Based Authentication

Another feature of Identity Awareness is the use of browser-based authentication. Identities from unidentified users can be acquired through Captive Portal and Transparent Kerberos Authentication. Captive Portal is a simple method that attempts authentication through a web interface before granting a user access to Intranet resources. Transparent Kerberos Authentication is when a browser attempts to authenticate users transparently by retrieving identity information before a Captive Portal sign-on page pops up. When Transparent Kerberos Authentication is enabled, Captive Portal requests authentication data from the browser itself. If this transparent method is unable to authenticate, then a user must enter their credentials in the Captive Portal sign-on before accessing the resources.

Identity Sharing

Identity Aware Security Gateways can share the identity information that they acquire with other Identity Aware Security Gateways. Users who need to pass through many Security Gateways are only identified once, without creating additional load on the identity sources or interfering with a streamlined end-user experience.

Data Center Integrations

Check Point CloudGuard Controller, Identity Awareness and Check Point security gateways integrate seamlessly within the following virtual cloud environments: Amazon Web Services (AWS), Microsoft Azure, Cisco ACI, Cisco ISE, Google Cloud Platform (GCP), Nuage Networks VSP, OpenStack, VMware vCenter and VMware NSX. CloudGuard Controller scanner periodically polls objects in the data center. The scanner then updates the management server data center objects and Identity Awareness enabled gateways to enforce the security policy.

Tightly Integrated Security Ecosystem

Identity Awareness is integrated into the consolidated Check Point Infinity Architecture that protects customers from sophisticated Gen V mega-cyber-attacks. It can be easily and rapidly deployed on existing Check Point Security Gateways and seamlessly integrates with multiple identity sources.

Next Generation Firewall is more than just a firewall

Specifications:


Supported Appliance Families
  • Check Point 2200, 4000, 12000, 21400 and 61000 Appliances
  • Check Point Power-1
  • Check Point IP Appliances
  • Check Point UTM-1
  • Check Point IAS
Supported Operating Systems
  • GAiA
  • SecurePlatform
  • IPSO 6.2 Disk-based¹
  • IPSO 6.2 Flash-based¹
  • Windows
Software Blades Interoperation
  • Firewall
  • Application Control
  • DLP²
  • IPS²
  • URL Filtering
Identity Agent Platform Support
  • Windows XP Home (SP3, 32-bit)
  • Windows XP Pro (SP3, 32-bit)
  • Vista (SP1, 32-bit)
  • Vista (SP1, 64-bit)
  • Windows 7 Professional/Enterprise/Ultimate (32-bit)
  • Windows 7 Professional/Enterprise/Ultimate (64-bit)
  • Windows Server 2003 (SP1-2, 32-bit)
  • Windows Server 2008 (SP1-2, 32-bit)

1 IPSO supports identity enforcement and logging. For identity acquisition (AD Query, Captive Portal and Identity Agents), use a SecurePlatform gateway and share the identities with the IPSO gateways.
2 Identity Awareness support coming soon

Documentation:

Download the Check Point Identity Awareness Datasheet (PDF).

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.