Check Point NG[s]AI
The real power of Check Point s solution comes to fruition when multiple components are used together. With the tight integration of the different technologies, very complex designs become not only possible but also manageable, ensuring complete end-to-end security throughout the enterprise and all related systems. You can mix and match technologies together to see how they can compliment each other.
For example, a virus or worm that propagates through Windows File Sharing (CIFS or Network Basic Input/Output System [NetBIOS]) can be blocked from infecting laptop users at home on broadband connections using the desktop firewalling and SCV capabilities of SecureClient. It can also be blocked from infecting your organization through a VPN with a business partner using the SmartDefense features on your gateway firewall. If you have laptop users on your LAN without SecureClient or visiting users, you can further contain infections by deploying firewalls to protect between network segments (i.e., Finance, Accounting, Internal Servers, and Wireless). With OPSEC solutions, you can extend this protection to protect against viruses propagating via HTTP and SMTP at the gateways, by leveraging the resources objects and the OPSEC CVP API (CVP), enforcing anti-virus updates, and ensuring that the virus is not present (i.e., checking to see if the MSBlast.exe file is running) on SecureClient users through SCV API. An administrator can enforce all these protections very quickly, view violations in a single log, and cover all entry points to the network to provide true end-to-end security.