The Check Point firewall is a device that provides controlled connectivity between an internal network and an external network (internet) while providing protection for the internal network by blocking traffic that isn’t explicitly allowed.
Check Point devices can be configured to provide additional security functions as well. CimTrak for Network Devices monitors the device configuration for changes, logs the changes, and then notifies the responsible parties.
When CimTrak locks a Check Point device for monitoring, it reads the configuration of the device. It calculates a digital signature of the configuration. At user-configured intervals, CimTrak reads the contents of the configuration, calculates the digital signature, and compares it to the signature stored in CimTrak's Master Repository.
When CimTrak detects a change in the configuration, its contents and its digital signature are then stored in the master repository. The master repository then logs the detected change and sends notifications to the configured emails and/or configured Syslog services, and/or SNMP services.
Get a copy of our CimTrak Technical Summary, our in-depth guide to all its capabilities.
Just let us know what capabilities you want to test out, and we'll set up a trial in your environment.