Data Sources |
Built-in Integration to Check Point Products |
See real-time information, trends and anomalies at a glance with security events displayed graphically to clearly represent the number, time and severity of the events |
Supported Products |
Multiple Check Point and third-party devices |
Graphical Log Parser |
Graphical log-parser to manually parse and ready any third-party log file |
Multiple Log Collection Methods |
Agent-based and agent-less log collection capabilities |
Visibility |
Timelines Views |
See real-time information, trends and anomalies at a glance with security events displayed graphically to clearly represent the number, time and severity of the events |
Chart Views |
View events statistics in bar charts or pie graphs |
Maps |
Geo-locate event source or destination IP on a map |
Events Quick-Views |
Immediate event grouping by top event type, event source, destination, user, country |
Security Event Analysis |
Predefined Security Events and Best-practice Event Correlation Management Rules |
Predefined events and correlation rules for industry-common security concerns based on Check Point best practice |
Customized Security Events |
Custom build event correlation rules to monitor any security event |
Forensics |
Drill down to event information by double-clicking on timelines, charts or maps; rapid data drilldown up to packet level |
Events Grouping & Search |
Easy-to-use search and data grouping for event analysis |
Identity Logging |
Map IP address to user name based on Active Directory |
ClientInfo Application |
Get full machine information (processes, hotfixes and vulnerability indications) for any device by right-clicking on device IP |
Intelligent Learning Mode |
Baselines activity to discover normal trends |
Vulnerability Assessment for Security Events |
Built-in vulnerability assessment of applicable security events |
Actionable Security |
Event Ticketing |
Assign events to administrators with ticketing workflow |
Global and Event Specific Exceptions |
Customize alerts to exclude events by product, source, destination and service |
Actionable Security |
Automatically or manually deal with a security event and change security policy based on event analysis |
Other |
Scalable Distributed Architecture |
Log server, event correlation server and event server can be deployed on separate systems |
Turn-key Appliance-based Solution |
Appliance-based solution for easy deployment |
Packaging |
Full SmartEvent |
Centralized, real-time security event correlation management for all Check Point products and third-party devices |
SmartEvent Intro |
Centralized, real-time security event correlation management for a single Check Point security Software Blade |