Check Point Identity Awareness offers granular visibility of users, groups, and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.
무료 평가판 받기Increase visibility of user activities with a dynamic user-based policy
Prevents unauthorized access, while still allowing users to work remotely
Enable on any Check Point gateway and integrate with leading identity vendors
It is clear that username and passwords no longer prove the identity of a user. Access control to your valuable assets must be strengthened. Check Point Identity Awareness ensures access to your data is granted only to authorized users, and only after their identities have been strictly authenticated; using Single Sign-On, Multi-Factor Authentication, Context-aware policies and anomaly detection.
1 2017 Verizon DBIR
Easily add user, user group and machine identity intelligence to your security defenses. Identity Awareness monitors traffic while giving you insight into user and computer identities. This lets you enforce access and audit data based on identity.
Identity Awareness maps users and computer identities, allowing for access to be granted or denied based on identity. The Check Point Identity Collector agent installed on a Windows host acquires identities from sources including Microsoft Active Directory Domain Controllers and Cisco Identity Services Engine (ISE).
Obtain identity from:
Identity Awareness is integrated into the Check Point Infinity Architecture. It can be easily and rapidly deployed on existing Check Point Security Gateways to seamlessly integrate with multiple identity sources.
침입 방지, 안티봇, 안티바이러스, URL 필터링, URL Reputation, IP Reputation, 도메인 Reputation, 안티 피싱, ID 인식, DDoS
CPU 수준 검사, 멀웨어 DNA, 위협 에뮬레이션, 위협 추출(CDR), 캠페인 추적(AI), 상황 인식 탐지(AI), 헌트레스(AI), 제로 피싱, 안티랜섬웨어, 계정 탈취, 멀웨어 회피 저항