Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
DeletedUser
Not applicable

Identity Awareness Reference Architecture and Best Practices Guide

IA-tech-reference.jpg

 

Abstract

Every IT organization can greatly enhance their security posture and increase the overall value of their network security deployment with contextual identity-based metadata. With our Identity Awareness API and integrations with leading directory stores and IAM vendors, Check Point security gateways fit well in large and small environments.

To create a winning design that is satisfying to your customer’s end users and IT staff, start with an in-depth discovery process to better understand the customer’s topology, users, connected devices, identity sources and identity topology. Ask the right questions. Become familiar with all possible identity sources. Design your Check Point deployment with identity in mind. Understand identity, access flows and use cases. Understand the impact on users, on the identity sources and the Check Point infrastructure.

Source: @Royi_Priov@Tzvi_Katz

0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events