Transcript WorkFlow
SmartWorkflow Change Management Software Blade ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Agenda Changing Business Needs Why Change Management? Introducing SmartWorkflow Summary ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties 2 Changing Business Needs Business Needs IT Administrators Constant Stream of Change Requests Gateways Multiple Policy Changes Multiple Policy Changes Risk to Security Risk to Compliance Risk to Performance Risk to Network Uptime Multiple and frequent changes to security policies often lead to mis-configurations and security risks ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties 3 Why Change Management? MITIGATE RISKS VISIBILITY AND CONTROL COMPLIANCE ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties 4 Introducing SmartWorkflow Software Blade Automated Policy Change Management ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties 5 SmartWorkflow Life Cycle ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties 6 Introducing SmartWorkflow Automated Policy Change Management Visual change tracking Reduces risk of security policy configuration errors Flexible authorization Conforms to established approval processes Comprehensive audit and reporting Enhances compliance by tracking evolution of policy changes Single Management Console Improves security and efficiency while reducing costs ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties 7 Edit Policies Make and visualize changes in SmartDashboard Changes Highlighted in SmartDashboard Policy changes are made Changeand New directly in the console highlighted for better tracking Highlighted Object ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties 8 Review Changes Easy review of changes with side by side difference report Policy BEFORE change ©2009 Check Point Software Technologies Ltd. All rights reserved. Policy AFTER Change [Confidential]—For Check Point users and approved third parties 9 Approve Changes Highlighted changes promote easy approval and Approve Changes ChangesReview Highlighted in SmartDashboard process and reduce errors Changed Policy ©2009 Check Point Software Technologies Ltd. All rights reserved. Added Object [Confidential]—For Check Point users and approved third parties 10 Flexible Authorization Conforms to an organization’s existing approval process Configuration Options: Role-based approval Self Approval Emergency Bypass ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties 11 Audit Trails Tracks evolution of policy changes and all Review and Approve Changes Changes Highlighted in SmartDashboard necessary details for regulatory compliance Audit Trail Who? What? ©2009 Check Point Software Technologies Ltd. All rights reserved. When? How? Why? [Confidential]—For Check Point users and approved third parties 12 SmartWorkflow Summary Automated Policy Change Management Visual change tracking Flexible authorization Audit trails Single Console Integration ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties 13