SmartDefense and Web Intelligence
暂无分享,去创建一个
The powerful options that Check Point NGX gateways offer help protect a network from internal and external threats. Some threats are arbitrary, but some attackers target their exploits for specific applications or servers. Either way, NGX provides sufficient detection and prevention for such threats. This chapter discusses specific examples of threats, peer-to-peer and SQL, and some ways to mitigate the risk associated with these threats. Deploying an NGX gateway properly takes more consideration than just implementing a typical security policy. One must consider where protections will provide the most “bang for your buck.” Check Point designed a comprehensive security product that can be leveraged to protect an organization at the perimeter. NGX not only provides access control but allows employing solutions that detect, prevent, or block attacks targeting protected hosts. The chapter provides some specific configuration examples and explains how easy it is to apply these protections. Check Point's NGX version of its virtual private network-1 (VPN-1) Pro Gateway is an exceptional way to begin securing one's network because it provides a multitude of protective and preventative tools to aid in the task of securing one's environment.