Firewall Analyzer for CheckPoint

Firewall Analyzer can analyze, report, and archive logs from your Check Point Firewalls. Firewall Analyzer has been OPSEC™ certified by Check Point and has joined the OPSEC Alliance.

Network Security and Capacity Management

Network Security and Capacity Management

With Firewall Analyzer for CheckPoint devices, you can access pre-defined reports that help in analyzing bandwidth usage and understanding security and network activities. These reports helps you to study the security vulnerability with top denied hosts, blocked URL hits, attacks, targets, virus, affected hosts, spam, receiving hosts.

Network Security and Capacity Management
Separator
Historical Trend Analysis for Bandwidth Capacity Planning

Historical Trend Analysis for Bandwidth Capacity Planning

Firewall Anlayzer trend reports of CheckPoint devices such as R54 trace patterns in network behavior and bandwidth usage over time. Analysis of trend reports gives better insight into the nature of web site traffic or network traffic, and helps you make decisions on capacity planning, business risk assessment, bandwidth management, traffic shaping, and network security posture.

Separator

VPN Usage and Connection Trend Analysis

VPN trend reports show trends in the number of VPN connections accessed through the Checkpoint firewall on a historical and current basis. VPN trends are especially useful in troubleshooting VPN connections, and identifying security risks.

VPN Usage and Connection Trend Analysis

Traffic & Bandwidth Management

Near Real-time Bandwidth Monitoring

Firewall Analyzer for CheckPoint provides you a unique way to monitor the Internet traffic of the network in near real-time. Firewall traffic data is collected and analyzed to get granular details about the traffic across each firewall. There is no requirement for any probes or collection agents to get these details on the traffic.

Near Real-time Bandwidth Monitoring
Separator
Security Audit

Network Traffic Analyzer

Firewall Analyzer measures network traffic based on the analysis of logs received from different network firewalls. Firewall logs are collected, archived, and analyzed to get granular details about traffic across Checkpoint firewall devices.

Separator

Employee Internet Usage Monitoring

With Firewall Analyzer for Checkpoint, you can maximize the business usage of Internet bandwidth using employee Internet monitoring. You can fine-tune the Firewall policies to block or restrict bandwidth guzzling web sites and in turn effectively control the employee Internet usage. This will ensure that the bandwidth is available for smooth functioning of the business.

Employee Internet Usage Monitoring

Security Audit

Firewall Analyzer for CheckPoint provides elaborate compliance report for the Firewall devices. The report helps to configure the Firewall rules, which will prevent potentially dangerous access to network and allow only those network hosts that are required. The issues are assessed and the results are presents as statistics.

Security Audit

Alarms

Apart from exhaustive firewall reports with respect to network security, Firewall Analyzer offers comprehensive alarms and their notifications.

Alarms can be generated for an anomalous security criteria, bandwidth values, and any normal criteria of security interest.

Alarms can be notified via email and SMS. It can trigger a script to achieve various threat mitigation activities. Alarms are also displayed in the UI screen.

Alarms

Checkpoint supported versions

Company Firewall/Version WELF Certified Other Log Format
Checkpoint Log import from all versions and
LEA support for R54 and above

VSX Firewalls - Virtual Edition supported
Available  

Why Choose Firewall Analyzer

Unlock the real value of your security devices

  • Supports an extensive array of perimeter security device logs which include firewalls, VPNs, IDS/IPS and proxy servers
  • Provides a wide range of reports for external threat monitoring, change management and regulatory compliance

Attractive TCO and rapid ROI

  • No additional hardware required, minimal entry cost and maintenance inclusive subscription model ensures a low TCO
  • Competitively priced. Quick deployment, instant results, reduced IT overhead ensures rapid ROI

Meet dynamic business needs quickly

  • Rapidly transforms perimeter security device logs into actionable information
  • Generates reports in user friendly formats like PDF and CSV formats

Productivity improvement for IT / MSSP

  • From product deployment to report generation in minutes!
  • Real-time alerts to security events enable IT to respond instantaneously to security threats

Steps to Configure

For detailed steps about how to configure Firewall Anlayzer with Checkpoint's firewall appliance you can refer this link here

A single platter for comprehensive Network Security Device Management