Listing Thumbnail

    Check Point Security Management (BYOL)

     Info
    A single security management console delivers consistent visibility, policy management, logging, reporting and control across all cloud environments and networks
    Listing Thumbnail

    Check Point Security Management (BYOL)

     Info

    Overview

    Play video

    Check Point Security Management provides advanced security management platform for enterprises to be more efficient at deploying protections across their organizations and across public, private and hybrid clouds.

    Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.

    Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.

    Security Management is required to control CloudGuard Network Security Gateways.

    Customers may use this BYOL offering if they have already obtained a Check Point Security Management license.

    To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.

    Highlights

    • One Platform, One Policy - a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
    • Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
    • Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including AWS GWLB, AWS Cloud WAN, AWS Outposts, Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux Gaia 3.10

    Pricing

    Check Point Security Management (BYOL)

     Info
    Pricing and entitlements for this product are managed outside of AWS Marketplace through an external billing relationship between you and the vendor. You activate the product by supplying an existing license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. Subscriptions have no end date and may be cancelled any time. However, the cancellation won't affect the status of an active license if it was purchased outside of AWS Marketplace.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Additional AWS infrastructure costs

    Type
    Cost
    EBS General Purpose SSD (gp2) volumes
    $0.10/per GB/month of provisioned storage

    Vendor refund policy

    Please see seller website for refund details.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:

    1. SSH password authentication is disabled in /etc/ssh/sshd_config
    2. For information regarding Firefox and Chrome refer to sk121373.

    Support

    Vendor support

    This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/  To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    11 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Computer & Network Security

    For PCI compliance, Check point is Excelent!!

    Reviewed on Oct 26, 2021
    Review provided by G2
    What do you like best about the product?
    One of the best thing is that we can get more details of each firewall by getting important data such as security overview, security modules, violations, etc., and the coolest thing is that you can print a report in case that is needed
    What do you dislike about the product?
    It is a little complecated if you want to create your charts or customize your outputs because if you don't have a good idea of what are you doing, you can get lost during the chart creation
    What problems is the product solving and how is that benefiting you?
    As a PCI compliance corporation, it has been beneficial to share any report needed
    Banking

    complete compliance and security suite for check point environment

    Reviewed on Oct 14, 2021
    Review provided by G2
    What do you like best about the product?
    It's straightforward to use. Price is low compared to other solutions. Many times it is bundled with the initial purchase. There's no need for additional Hardware and Solution required to configure the compliance. You can get the output of the compliance results very quickly. Similar vendors do not have this solution. They are trying the cover the gap throughout the reporting modules or dashboards. Solutions is interactive. This interaction and real time features help the firewall admins to quickly see the operational and logical mistakes while maintaning the daily security activities. Findings screen is interactive where you can jump on the item and solve the issue within a click.
    What do you dislike about the product?
    It's unique to Checkpoint. Well, Checkpoint had acquired the easy2comply solution in 2011. Then it' had customized this solution for Checkpoint firewalls. However, while it's made the acquisition, some of easy2comply features have been dropped. Why I'm mentioning this because we had an old Dynasec customer. Therefore we had used the solution for overall compliance. Current Checkpoint compliance is just for the Checkpoint firewalls. You can't use the solution for other security components. Some of the problems related to the compliance solutions is the roadmap and workflow entegrations. Product does not have the user defined networking security where you define the critical zones and traffic flow.
    What problems is the product solving and how is that benefiting you?
    As for the financial companies, you should be align with the regulations. Checkpoint compliance is ensuring us to be compliant with these regulations. Throughout the audit, auditors analyze the compliance module outputs. Therefore this product is assisting the auditors as well as firewall administrators. As there are already defined regulations checks on the solutions, I do not need to know or define every mapped item.
    Recommendations to others considering the product:
    It's not well suited for a hybrid environment where you have several different vendors. You need to enable the solution to start monitoring. Default installations do not have the solution to be enabled and started. Enable the reporting to get the results. Otherwise, you need to log in open the compliance view, and see the results. It's not a product like let it run and see the results. It's a dynamic solution and needs constant attention to achieve the best results.
    venkatesh G.

    Great Platform To Fulfill Up To Date Security Requirements !!!!

    Reviewed on Jul 15, 2021
    Review provided by G2
    What do you like best about the product?
    The best thing I like the most about Cloudguard IaaS is the new feature, such as Updateable Object, Datacenter Object. We use the Updateable Object for the Cloud service, and we don't need to add many IP addresses that need to be. It saves the time to edit the firewall policy and can update the IP address automatically from the freed. Datacenter Object is another feather used in our cloud environment
    What do you dislike about the product?
    The most dislinking part is the license. We need to use the command to apply the license to the gateway but not the Smart Update, and it is not friendly to our environment cause execute the controls at the management server need to raise change request.
    What problems is the product solving and how is that benefiting you?
    Datacenter Object is another feather used in our cloud environment. Before we use this, we need to add a lot of firewall policies to allow the connection. After implementing the Datacenter Object, we just need to edit the cloud tag to add or remove the IP/subnet.
    Recommendations to others considering the product:
    I recommend everyone to try this platform once, and you will get to know the features involved.
    potturu k.

    Checkpoint NGFW

    Reviewed on Jul 15, 2021
    Review provided by G2
    What do you like best about the product?
    It has a centralized dashboard to manage all checkpoint security gateway.
    What do you dislike about the product?
    Dedicated throughput is not available for each module.
    What problems is the product solving and how is that benefiting you?
    To host services that can access via the cloud directly.
    Marketing and Advertising

    Compliance Blade is very powerful and keep system compliant

    Reviewed on Jul 14, 2021
    Review provided by G2
    What do you like best about the product?
    It checks windows update are done on machine , check Anti-virus and anti-malware signatures up to date.it also check which application we can use which makes the system compliant.
    What do you dislike about the product?
    Policy creation is little tough , need some experience to define policies
    What problems is the product solving and how is that benefiting you?
    Earlier users use unwanted applications which make system out of compliance, but after using Check Point compliance blade we can control use of application and other things.
    Recommendations to others considering the product:
    Use it to make company users laptops compliant.
    View all reviews