<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Checkpoint hierrarchy - 2 / 3 teir architecture.? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-hierrarchy-2-3-teir-architecture/m-p/4209#M340</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checkpoint hierrarchy - 2 / 3 teir architecture. what are they and there uses answer me in simple way like to answer in interview&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Jul 2017 11:44:12 GMT</pubDate>
    <dc:creator>yoganand_i</dc:creator>
    <dc:date>2017-07-17T11:44:12Z</dc:date>
    <item>
      <title>Checkpoint hierrarchy - 2 / 3 teir architecture.?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-hierrarchy-2-3-teir-architecture/m-p/4209#M340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checkpoint hierrarchy - 2 / 3 teir architecture. what are they and there uses answer me in simple way like to answer in interview&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jul 2017 11:44:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-hierrarchy-2-3-teir-architecture/m-p/4209#M340</guid>
      <dc:creator>yoganand_i</dc:creator>
      <dc:date>2017-07-17T11:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint hierrarchy - 2 / 3 teir architecture.?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-hierrarchy-2-3-teir-architecture/m-p/4210#M341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A 2 or 3 tier&amp;nbsp;architecture is not specific to Check Point.&lt;/P&gt;&lt;P&gt;&lt;A href="https://en.wikipedia.org/wiki/Multitier_architecture"&gt;From Wikipedia&lt;/A&gt;:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-size: 14px;"&gt;In &lt;/SPAN&gt;&lt;A href="https://en.wikipedia.org/wiki/Software_engineering" style="color: #0b0080; text-decoration: none; font-size: 14px;" title="Software engineering"&gt;software engineering&lt;/A&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-size: 14px;"&gt;, &lt;/SPAN&gt;&lt;STRONG style="color: #222222; font-size: 14px;"&gt;multitier architecture&lt;/STRONG&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-size: 14px;"&gt; (often referred to as &lt;/SPAN&gt;&lt;STRONG style="color: #222222; font-size: 14px;"&gt;&lt;EM&gt;n&lt;/EM&gt;-tier architecture&lt;/STRONG&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-size: 14px;"&gt;) or &lt;/SPAN&gt;&lt;STRONG style="color: #222222; font-size: 14px;"&gt;multilayered architecture&lt;/STRONG&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-size: 14px;"&gt; is a &lt;/SPAN&gt;&lt;A href="https://en.wikipedia.org/wiki/Client%E2%80%93server_architecture" style="color: #0b0080; text-decoration: none; font-size: 14px;" title="Client–server architecture"&gt;client–server architecture&lt;/A&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-size: 14px;"&gt; in which presentation, application processing, and data management functions are physically separated. The most widespread use of multitier architecture is the &lt;/SPAN&gt;&lt;STRONG style="color: #222222; font-size: 14px;"&gt;three-tier architecture&lt;/STRONG&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-size: 14px;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Network security devices such as Check Point can be deployed to protect this sort of architecture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That said, the Check Point general approach to information security is described in the &lt;A href="https://www.checkpoint.com/products-solutions/software-defined-protection-sdp/"&gt;Software Defined Protection&lt;/A&gt;&amp;nbsp;framework, which&amp;nbsp;partitions the security infrastructure into three interconnected layers:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV title="Page 15"&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;An Enforcement Layer that is based on physical, virtual and host-based security enforcement points and that segments the network as well as executes the protection logic in high-demand environments.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;A Control Layer that analyses different sources of threat information and generates protections and policies to be executed by the Enforcement Layer.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;A Management Layer that orchestrates the infrastructure and brings the highest degree of agility to the entire architecture.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="display: inline !important;"&gt;&lt;/P&gt;&lt;P style="display: inline !important;"&gt;The &lt;A href="https://www.checkpoint.com/downloads/product-related/Ebook/Software-defined%20Protection(2).pdf"&gt;Software-Defined Protection Enterprise Security Blueprint&lt;/A&gt; describes the architecture in more detail and provides several design patterns for enterprise networks.&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jul 2017 15:45:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-hierrarchy-2-3-teir-architecture/m-p/4210#M341</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-07-17T15:45:36Z</dc:date>
    </item>
  </channel>
</rss>

