cancel
Showing results for 
Search instead for 
Did you mean: 
Create a Post

Check Point For Beginners Lectures Series. Part 10 - Identity Awareness

Navigation

Part 1 - Architecture                

Part 2 - Preparing the Lab 

Part 3 - Installing Security Management Server

Part 4 - Installing Security Gateway

Part 5 - Gaia WebUI and CLI 

Part 6 - Working with SmartConsole 

Part 7 - Managing Security Policies 

Part 8 - Network Address Translation 

Part 9 - Application Control, URL Filtering and Content Awareness

Part 10 - Identity Awareness                          <--- You are here

Part 11 - Threat Prevention

Part 12 - Logs and Reporting

 

Introduction

Identity Awareness (IA) allows you to easily add user, user group, and machine identity intelligence to your security defenses.

Traditionally, firewalls use IP addresses to monitor traffic and are unaware of the user and computer identities behind those IP addresses.

Identity Awareness maps users and computer identities to IP addresses, allowing you to enforce access and audit data based on identity. IA is an easy to deploy and scalable solution. It is applicable for both Active Direc

...;
TO READ THE FULL POST it's simple and free
5 Comments