Analista de TI - suporte a redes e segurança at Tribunal de Contas da União
Real User
Top 5
2024-04-11T18:49:09Z
Apr 11, 2024
We have main offices in Brazil and branch offices in each of our state capitals. So, we have 26 branch offices in total. Each branch office used to have a small Check Point appliance. We're moving away from that model; they won't access the internet directly anymore. Instead, they'll pass through a central kind of star network. We use two levels of firewalls: an external firewall and an internal firewall. We have a DMZ between these two firewall clusters with high availability. Each firewall has IPS, web content filtering, bot protection, and antivirus enabled. We'll contract some of those features as part of an MSSP service. We don't buy products or appliances directly. Our procurement requirements allow other manufacturers to participate. The decision isn't ours or the integrator's – it's how we buy in Brazil. The vendor offering the lowest price for a product that meets the requirements wins. We cannot choose a specific brand or product name.
We use the solution for testing and conducting. For instance, we test this product using open-source samples containing different ransomware tools and another element.
Check Point Infinity helps in developing centralized applications within an enterprise. Its primary use case is to enhance security and scalability in enterprise systems. It provides a robust framework for creating, managing, and securing centralized networks, ensuring data and transaction integrity. Check Point Infinity addresses scalability challenges by offering a solution capable of handling the growing volume of transactions while maintaining decentralization.
The use case involves managing various aspects, including endpoint security, SaaS interface, and firewall management within the Check Point Infinity architecture. The Infinity portal serves as a centralized hub for overseeing all components of the Check Point security suite. The architecture incorporates XDR and MDR, enabling automatic correlation of information. In scenarios where a security issue arises, the system can automatically analyze data from diverse platforms, such as endpoints, firewalls, and Office 365. T
We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.
We were looking for a solution that would allow us to establish a configuration with the different security devices remotely while centralizing management and including other products available at the security level. We looked into different options and brands that allowed us to establish, achieve and fulfill this need. This was one of the solutions that met all of these aforementioned characteristics, thus giving us 360º protection and accommodation in terms of managing security services.
We needed to handle the administration of the tools that we have with Check Point without the use of administration servers and from the cloud. With this product, we can centrally manage our security environments for the company through a web portal. It is really easy to do it this way as the portal is managed directly by Check Point. We can detach ourselves from the portal and focus on the security of the infrastructure itself. The portal is extremely intuitive for admins.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Real User
2022-11-06T05:00:00Z
Nov 6, 2022
Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.
As part of a large organization, this product gained the visibility of our security team thanks to its reputation of having the most advanced technology against the latest cyber threats. It protects everything, from cloud and company networks to endpoints and mobile devices, by adopting Check Point Infinity security architecture as a strategy to neutralize fifth-generation threats that spread fast and at a large scale through different vectors. We also saved money in our security implementation measures with this solution.
When validating the centralized environment, we began to use other tools of the Check Point family that are available through the portal. Some licenses already bring what is required to be able to manage. The tool complies with the mobility issue since it can be used from anywhere. The initial implementation was accomplished easily and without deployment problems. Its quite intuitive dashboard helped us a lot with the administration.
Check Point Infinity is used to protect information that is moved to the cloud. For example, when you upload your documents to the cloud wherever you are, that document can be encrypted so that no one can access it outside that domain. If they try to impersonate a user they won't be able to access it. There is verification that takes place if they are requesting to access a document with a password and a username to gain access.
As we adapt to the changes left by the pandemic, we must adapt our technologies, our equipment, and the traditional scheme in which we worked must evolve. As a result of these changes, we have been adopting security and much of the administration with fully cloud services to be able to adapt to these changes and give greater adaptability to our technologies. With Check Point Infinity, we have the possibility of managing our platform from the cloud. It also offers us centralization and other solutions of the same portfolio in one place, taking advantage of great advantages; it is at this point where Check Point allows us to take advantage of a secure and centralized administration.
At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used. It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.
The first use we had of this portal with these characteristics was Check Point Smart Cloud to manage our approved gateways in Microsoft Azure. Our vendor told us about the solution. It was not required to use a management server since this portal provided the same service of free or licensed with the same licenses already obtained from our gateways. It is really very easy to implement and offers very versatile usage, giving us economy since we do not have to use a server to be able to administer it. We are really happy with the service.
Cloud Support at a tech company with 51-200 employees
User
2022-05-04T04:51:00Z
May 4, 2022
We have used the Infinity Check Point portal to use two edges, Harmony Connect, and the SmartConsole. We have managed our Check Point gateways through the web SmartConsole administration, which helps us not to have or depend on virtual or physical management, the licensing is included with the gateway license. On the other hand, we have also used the functionality of Check Point Harmony connect, all these functionalities integrated into a portal that has many more to complement all security departments.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-03-30T06:29:00Z
Mar 30, 2021
We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today. The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack. To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
We leveraged Check Point Infinity primarily for gateway security, cloud security, endpoint security, and infrastructure as a service.
We have main offices in Brazil and branch offices in each of our state capitals. So, we have 26 branch offices in total. Each branch office used to have a small Check Point appliance. We're moving away from that model; they won't access the internet directly anymore. Instead, they'll pass through a central kind of star network. We use two levels of firewalls: an external firewall and an internal firewall. We have a DMZ between these two firewall clusters with high availability. Each firewall has IPS, web content filtering, bot protection, and antivirus enabled. We'll contract some of those features as part of an MSSP service. We don't buy products or appliances directly. Our procurement requirements allow other manufacturers to participate. The decision isn't ours or the integrator's – it's how we buy in Brazil. The vendor offering the lowest price for a product that meets the requirements wins. We cannot choose a specific brand or product name.
We use the solution for testing and conducting. For instance, we test this product using open-source samples containing different ransomware tools and another element.
Check Point Infinity helps in developing centralized applications within an enterprise. Its primary use case is to enhance security and scalability in enterprise systems. It provides a robust framework for creating, managing, and securing centralized networks, ensuring data and transaction integrity. Check Point Infinity addresses scalability challenges by offering a solution capable of handling the growing volume of transactions while maintaining decentralization.
The use case involves managing various aspects, including endpoint security, SaaS interface, and firewall management within the Check Point Infinity architecture. The Infinity portal serves as a centralized hub for overseeing all components of the Check Point security suite. The architecture incorporates XDR and MDR, enabling automatic correlation of information. In scenarios where a security issue arises, the system can automatically analyze data from diverse platforms, such as endpoints, firewalls, and Office 365. T
We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.
My company's clients use Check Point Infinity to protect their data.
We were looking for a solution that would allow us to establish a configuration with the different security devices remotely while centralizing management and including other products available at the security level. We looked into different options and brands that allowed us to establish, achieve and fulfill this need. This was one of the solutions that met all of these aforementioned characteristics, thus giving us 360º protection and accommodation in terms of managing security services.
We needed to handle the administration of the tools that we have with Check Point without the use of administration servers and from the cloud. With this product, we can centrally manage our security environments for the company through a web portal. It is really easy to do it this way as the portal is managed directly by Check Point. We can detach ourselves from the portal and focus on the security of the infrastructure itself. The portal is extremely intuitive for admins.
Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.
As part of a large organization, this product gained the visibility of our security team thanks to its reputation of having the most advanced technology against the latest cyber threats. It protects everything, from cloud and company networks to endpoints and mobile devices, by adopting Check Point Infinity security architecture as a strategy to neutralize fifth-generation threats that spread fast and at a large scale through different vectors. We also saved money in our security implementation measures with this solution.
When validating the centralized environment, we began to use other tools of the Check Point family that are available through the portal. Some licenses already bring what is required to be able to manage. The tool complies with the mobility issue since it can be used from anywhere. The initial implementation was accomplished easily and without deployment problems. Its quite intuitive dashboard helped us a lot with the administration.
Check Point Infinity is used to protect information that is moved to the cloud. For example, when you upload your documents to the cloud wherever you are, that document can be encrypted so that no one can access it outside that domain. If they try to impersonate a user they won't be able to access it. There is verification that takes place if they are requesting to access a document with a password and a username to gain access.
As we adapt to the changes left by the pandemic, we must adapt our technologies, our equipment, and the traditional scheme in which we worked must evolve. As a result of these changes, we have been adopting security and much of the administration with fully cloud services to be able to adapt to these changes and give greater adaptability to our technologies. With Check Point Infinity, we have the possibility of managing our platform from the cloud. It also offers us centralization and other solutions of the same portfolio in one place, taking advantage of great advantages; it is at this point where Check Point allows us to take advantage of a secure and centralized administration.
At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used. It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.
The first use we had of this portal with these characteristics was Check Point Smart Cloud to manage our approved gateways in Microsoft Azure. Our vendor told us about the solution. It was not required to use a management server since this portal provided the same service of free or licensed with the same licenses already obtained from our gateways. It is really very easy to implement and offers very versatile usage, giving us economy since we do not have to use a server to be able to administer it. We are really happy with the service.
We have used the Infinity Check Point portal to use two edges, Harmony Connect, and the SmartConsole. We have managed our Check Point gateways through the web SmartConsole administration, which helps us not to have or depend on virtual or physical management, the licensing is included with the gateway license. On the other hand, we have also used the functionality of Check Point Harmony connect, all these functionalities integrated into a portal that has many more to complement all security departments.
We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today. The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack. To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.
We primarily implement the solution for our clients.