Know your gear
The Extended Module for Check Point Next Generation Firewall enables sharing of contextual information between ForeScout CounterACT and Check Point Next Generation Firewall (NGFW). The joint solution leverages complementary capabilities to provide real-time visibility and precise, automated controls for secure access to critical applications and resources. This enables IT organizations to implement dynamic network segmentation and create identity-aware security policies within their NGFW based on device context from ForeScout.
The CounterACT network security appliance provides IT organizations with the unique ability to see devices, including non-traditional devices, the instant they connect to the network. CounterACT provides policy-based control of these devices. It works with the ForeScout Extended Modules to orchestrate information sharing and automate workflows among disparate security and IT management tools, including Check Point NGFW.
Check Point Next Generation Firewall is a security gateway which scans network traffic content and allows creation of granular security policies based on user identity and device context. The Extended Module for Check Point NGFW provides this identity information and real-time device context to the NGFW for various IP-connected devices, including corporate, BYOD, guest and IoT devices.
The joint solution leverages CounterACT's profiling, classification and assessment capabilities to accurately classify endpoints and dynamically register them in the predefined groups within the NGFW. This enables the NGFW to segment resources on a need-to-know basis and assign access to resources on the move. Additionally, by providing user identity information to the Check Point NGFW with Identity Awareness blade, the Extended Module enables you to create granular identity-aware security policies.
With the Extended Module for Check Point NGFW, you can gain unique endpoint visibility, assign access to resources on the move and create granular, identity-aware security policies. This helps to reduce your attack surface, prevent unauthorized access to sensitive resources and minimize malware proliferation and data breaches.
The CounterACT network security appliance provides IT organizations with the unique ability to see devices, including non-traditional devices, the instant they connect to the network. CounterACT provides policy-based control of these devices. It works with the ForeScout Extended Modules to orchestrate information sharing and automate workflows among disparate security and IT management tools, including Check Point NGFW.
Check Point Next Generation Firewall is a security gateway which scans network traffic content and allows creation of granular security policies based on user identity and device context. The Extended Module for Check Point NGFW provides this identity information and real-time device context to the NGFW for various IP-connected devices, including corporate, BYOD, guest and IoT devices.
The joint solution leverages CounterACT's profiling, classification and assessment capabilities to accurately classify endpoints and dynamically register them in the predefined groups within the NGFW. This enables the NGFW to segment resources on a need-to-know basis and assign access to resources on the move. Additionally, by providing user identity information to the Check Point NGFW with Identity Awareness blade, the Extended Module enables you to create granular identity-aware security policies.
With the Extended Module for Check Point NGFW, you can gain unique endpoint visibility, assign access to resources on the move and create granular, identity-aware security policies. This helps to reduce your attack surface, prevent unauthorized access to sensitive resources and minimize malware proliferation and data breaches.