Overview
Check Point Security Management provides an advanced security management platform for enterprises to deploy protections across their organizations, across public, private and hybrid clouds.
Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.
Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.
Security Management is required to control CloudGuard Network Security Gateways.
Customers requiring security management for up to 5 Security Gateways may deploy this offering on instances with less than 8 compute cores. Managing more than 5 Gateways on an instance with less than 8 compute cores is not supported. Customers requiring security management for up to 25 Security Gateways must deploy this offering on instances with 8 or more compute cores.
Customers requiring security management for more than 25 Security Gateways should contact Check Point or purchase BYOL.
To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.
Highlights
- One Platform, One Policy a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
- Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
- Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.
Details
Typical total price
$0.847/hour
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
- ...
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
m5.large | $0.62 | $0.096 | $0.716 |
m5.xlarge | $0.62 | $0.192 | $0.812 |
m5.2xlarge | $0.62 | $0.384 | $1.004 |
m5.4xlarge | $1.83 | $0.768 | $2.598 |
m5.8xlarge | $1.83 | $1.536 | $3.366 |
m5.12xlarge | $1.83 | $2.304 | $4.134 |
m5.16xlarge | $1.83 | $3.072 | $4.902 |
m5.24xlarge | $1.83 | $4.608 | $6.438 |
m6i.large | $0.62 | $0.096 | $0.716 |
m6i.xlarge | $0.62 | $0.192 | $0.812 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
Terminate the instance at any given time to stop incurring charges.
Custom pricing options
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:
- SSH password authentication is disabled in /etc/ssh/sshd_config
- For information regarding Firefox and Chrome refer to sk121373.
Resources
Support
Vendor support
This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/ To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
An integrated, comprehensive security architecture
one of the major advantages is that it uses machine learning
The tool has another great advantage compared to the others on the market, it manages a very low rate of alerts with a false positive
They should improve the use of performance since it consumes a lot of CPU and memory. It has problems updating licenses automatically.
You should offer training in the use of the tool since the learning curve is high.
They should have more information available about the tool or in one place to be able to find it quickly.
They should improve the technical support service since it is not one of the best features.
Thanks to how practical the tool is, we were able to minimize security times that took us a long time on previous occasions and to be able to take advantage of them in other tasks and to simplify the work of the company's support
It has a very efficient record management since it provides precise information which, if it is necessary to investigate, will be handy.