Transcript WorkFlow

SmartWorkflow
Change Management Software Blade
©2009 Check Point Software Technologies Ltd. All rights reserved.
[Confidential]—For Check Point users and approved third parties
Agenda




Changing Business Needs
Why Change Management?
Introducing SmartWorkflow
Summary
©2009 Check Point Software Technologies Ltd. All rights reserved.
[Confidential]—For Check Point users and approved third parties
2
Changing Business Needs
Business Needs
IT Administrators
Constant
Stream of
Change
Requests
Gateways
Multiple
Policy
Changes
Multiple
Policy
Changes
Risk to Security
Risk to Compliance
Risk to Performance
Risk to Network Uptime
Multiple and frequent changes to security policies often lead to
mis-configurations and security risks
©2009 Check Point Software Technologies Ltd. All rights reserved.
[Confidential]—For Check Point users and approved third parties
3
Why Change Management?
MITIGATE RISKS
VISIBILITY AND CONTROL
COMPLIANCE
©2009 Check Point Software Technologies Ltd. All rights reserved.
[Confidential]—For Check Point users and approved third parties
4
Introducing SmartWorkflow Software Blade
Automated
Policy Change
Management
©2009 Check Point Software Technologies Ltd. All rights reserved.
[Confidential]—For Check Point users and approved third parties
5
SmartWorkflow Life Cycle
©2009 Check Point Software Technologies Ltd. All rights reserved.
[Confidential]—For Check Point users and approved third parties
6
Introducing SmartWorkflow
Automated Policy Change Management
Visual change tracking
Reduces risk of security policy
configuration errors
Flexible authorization
Conforms to established approval
processes
Comprehensive audit
and reporting
Enhances compliance by tracking
evolution of policy changes
Single Management
Console
Improves security and efficiency
while reducing costs
©2009 Check Point Software Technologies Ltd. All rights reserved.
[Confidential]—For Check Point users and approved third parties
7
Edit Policies
Make and
visualize changes
in SmartDashboard
Changes
Highlighted
in SmartDashboard
Policy changes are made
Changeand
New directly in the console
highlighted
for better tracking
Highlighted
Object
©2009 Check Point Software Technologies Ltd. All rights reserved.
[Confidential]—For Check Point users and approved third parties
8
Review Changes
Easy review of changes with side by side
difference report
Policy BEFORE change
©2009 Check Point Software Technologies Ltd. All rights reserved.
Policy AFTER Change
[Confidential]—For Check Point users and approved third parties
9
Approve Changes
Highlighted changes promote easy approval
and Approve
Changes
ChangesReview
Highlighted
in
SmartDashboard
process and reduce errors
Changed
Policy
©2009 Check Point Software Technologies Ltd. All rights reserved.
Added
Object
[Confidential]—For Check Point users and approved third parties
10
Flexible Authorization
Conforms to an organization’s existing
approval process
Configuration Options:
Role-based approval
Self Approval
Emergency Bypass
©2009 Check Point Software Technologies Ltd. All rights reserved.
[Confidential]—For Check Point users and approved third parties
11
Audit Trails
Tracks evolution of policy changes and all
Review
and Approve
Changes
Changes
Highlighted
in
SmartDashboard
necessary details for regulatory compliance
Audit Trail
Who?
What?
©2009 Check Point Software Technologies Ltd. All rights reserved.
When?
How?
Why?
[Confidential]—For Check Point users and approved third parties
12
SmartWorkflow Summary
Automated Policy Change Management
Visual change tracking
Flexible authorization
Audit trails
Single Console
Integration
©2009 Check Point Software Technologies Ltd. All rights reserved.
[Confidential]—For Check Point users and approved third parties
13