CimTrak for Check Point

What We Monitor

The Check Point firewall is a device that provides controlled connectivity between an internal network and an external network (internet) while providing protection for the internal network by blocking traffic that isn’t explicitly allowed.

Check Point devices can be configured to provide additional security functions as well. CimTrak for Network Devices monitors the device configuration for changes, logs the changes, and then notifies the responsible parties of them.

checkpoint

How CimTrak for Check Point Works

When CimTrak locks a Check Point device for monitoring, it reads the configuration of the device. It calculates a digital signature of the configuration, and stores it in CimTrak’s master repository along with a copy of the configuration. At user-configured intervals, CimTrak reads the contents the configuration, calculates the digital signature, and compares it to the signature stored in CimTrak’s master repository.


When CimTrak detects a change in the configuration, its contents and its digital signature is then stored in the master repository. The master repository then logs the detected change and sends notifications to the configured emails and/or configured syslog services and/or SNMP services.

 

Benefits of using CimTrak for Check Point

CimTrak detects any change to the Check Point device’s running configuration.

  • When changes are detected, CimTrak for Network Devices can be used to compare the device’s configuration to its previous configuration, and restore a previous configuration when necessary.
  • CimTrak for Network Devices can detect any change to the Check Point device’s startup configuration, log the activity, and notify the responsible parties by e-mail, Syslog or SNMP.

 

Network Devices

 Real-Time Insight into Your Entire Network

Do you have the confidence and trust with your FIM software?