Internet technology has changed not only the way organizations do business, but also the way they approach network security. Corporate networks are no longer defined by physical boundaries, but instead by enterprise-wide security policies. To be effective, these policies must include a broad range of security services that govern access to network information resources while protecting the privacy and integrity of network communications across the Internet, intranet and extranet. 

Check Point Software Technologies offers a comprehensive solution to meet these new and expanding security requirements. Check Point FireWall-1 is an enterprise security suite which combines Internet, intranet/extranet and remote user access control with authentication, encryption, network address translation (NAT) and content screening services to deliver an integrated solution that scales to meet the demands of organizations large and small. The product suite is unified by Check Point's OPSEC [Open Platform for Secure Enterprise Connectivity] policy management framework which provides central integration, configuration and management for Check Point FireWall-1 as well as other third-party security applications. Only FireWall-1 provides organizations with the ability to define a single, integrated security policy that can be distributed across multiple firewall gateways and managed remotely from anywhere on the enterprise network. Additional capabilities such as router security management, traffic load balancing and high availability are also available and can be fully integrated into the overall, enterprise security policy. Check Point FireWall-1 is transparent to network users and delivers the highest possible performance across multiple protocols and high-speed networking technologies. With installations at thousands of customer sites worldwide, Check Point FireWall-1 is the most widely tested firewall available. 

Based on Stateful inspection technology, the new generation of firewall technology invented and patented by Check Point Software Technologies, Check Point FireWall-1 provides the highest level of security possible. Stateful inspection incorporates communication- and application-derived state and context information which is stored and updated dynamically. This innovative approach provides full application-layer awareness without requiring a separate proxy for every service to be secured. Customers benefit through improved performance, scalability, and the ability to secure new and custom applications much more quickly. Check Point FireWall-1 supports hundreds of pre-defined services, applications and protocols out-of-the-box. The programmable INSPECT virtual machine, at the core of the FireWall-1 technology, allows Check Point to add support for new and custom applications quickly and easily. 

Check Point FireWall-1 employs a distributed, client/server architecture, providing scalability and centralized management for multiple firewall gateways located anywhere on the enterprise network. Cross-platform support for Windows 95, Windows NT, UNIX and internetworking equipment (routers, switches, remote access devices) from one of Check Point's OPSEC partners provides the highest degree of deployment flexibility in the industry. 

What to consider?

Check Point Software Technologies provides a suite of applications scalable to small, medium and large businesses, providing complete enterprise-wide security, regardless of how customers define their network boundaries. To learn more about specific areas to consider when building an enterprise-wide security policy, follow the links listed below: 

What about hackers?

Many well known and documented types of hacker attacks exist today and new forms of attack are appearing every day. This makes it very difficult for an organization using a home-grown security system to keep up. Check Point Software Technologies is dedicated to monitoring and analyzing new methods developed to breach network security and to incorporate new defenses against these attacks into FireWall-1. With its unsurpassed flexibility and extensibility, Stateful inspection technology is a key differentiator in this area, allowing Check Point FireWall-1 customers to benefit from the incorporation of defenses against new security threats as soon as they appear. Some common attacks and defenses are described below. 

  • SYN Flooding attack 
  • Ping of Death attack
  • IP spoofing attack
  • Stealthing Defense

What is Stateful Inspection?

Stateful inspection is the new generation of firewall technology, invented and patented by Check Point Software Technologies. Stateful inspection provides full application-layer awareness without requiring a separate proxy for every service to be secured. This results in multiple benefits to customers including excellent performance, scalability and the ability to support new and custom applications and services quickly and easily. Giga Information Group reported in its March 17, 1997 issue of Gigawire, "We believe that stateful inspection will be adopted by a broad segment of the computer industry as the standard way to provide gateway security in the future". The evolution in the industry has been from packet filters to application-layer proxies, to stateful inspection. This evolution has taken place based upon the advantages introduced with each new generation of firewall technology. Stateful inspection architecture is unique in that it understands the state of any communication through the firewall machine, including packet, connection and application information. Packet filters do not track application or connection state, which are integral to a comprehensive security decision. Application proxies track only application state, not packet or connection state, which may introduce security vulnerabilities. 

Check Point FireWall-1's patented stateful inspection implementation provides the highest possible level of security. FireWall-1 inspects communications at layers 3-7 of the OSI model, whereas application gateways can only check layers 5-7. This provides Check Point FireWall-1 with the unique triad of packet-, connection-, and application-awareness. Cumulative data from communication states, application states, network configuration and security rules are used to enforce the enterprise security policy. For added protection, FireWall-1 intercepts, analyzes, and takes action on all communications before they enter the operating system of the gateway machine, ensuring that the operating system is protected from exposure to untrusted communications. 

Check Point's stateful inspection implementation is a high performance solution, experiencing no degradation even at high networking transmission speeds. Driven by its patented INSPECT Virtual Machine, Check Point FireWall-1 offers much better performance than the leading application gateway firewall systems, as validated by independent performance tests (see Data Communications, March 21, 1997; http://www.data.com/lab_tests/firewalls97.html). 

Check Point's stateful inspection implementation uses the information in dynamic state tables to its advantage by checking this information first when evaluating communication attempts. This provides excellent performance and ensures that communications are being assessed according to the very latest state information. State tables are kept in the operating system kernel memory and cannot become corrupted like disk files. If the system fails due to a hardware or software error, new tables are allocated and no old/corrupted data is valid anymore. Furthermore, the data in the state tables represents active connections, so if a hardware or software error were to occur, the connections would no longer be active and therefore disabled, preserving the security of the network. 

What is OPSEC?

Check Point's Open Platform for Secure Enterprise Connectivity [OPSEC] is a revolutionary concept in enterprise-wide security - a single platform that integrates and manages all aspects of network security through an open, extensible management framework. Third party security applications can plug into the OPSEC framework via published application programming interfaces (APIs), industry-standard protocols and INSPECT, a high-level scripting language. Once integrated into the OPSEC framework, all applications can be configured and managed from a central point, utilizing a single policy editor. 

How do I define a single security policy across multiple platforms?

Check Point FireWall-1 uses a state-of-the-art distributed client server architecture that allows you to define the security policy in a central location, and then distribute the security policy to all enforcement points. In addition, multiple user access control allows different people across the organization to manage the security policy, based upon their authorization levels, through the intuitive, point and click graphical user interface. Once the security policy is defined, the system converts the rule base into an INSPECT applet which is sent to all appropriate enforcement points throughout the network. Since the INSPECT applet is platform independent, virtually any system can be supported using Check Point's stateful inspection technology. 

What is the best platform to use?

This is a frequently asked question to which there is no one correct answer. The right platform depends upon the specific network configuration, the number of network nodes to be secured, the required performance and the skill set of the security administrators within the organization. At Check Point Software Technologies, we believe that all points of network access should be secured, regardless of platform technology. It is not reasonable to require special hardware or software to provide secure connectivity. This is why Check Point FireWall-1 can be supported across multiple platforms, including NT and UNIX servers, routers, switches and many other internetworking devices. The important factor is that all of these platforms are running the same software and can be managed with the same graphical user interface from a central management console. An important consideration when evaluating a platform is the number of interfaces it supports. Platforms limited to two network interfaces cannot support a DMZ (De-Militarized Zone) which may be crucial for your security implementation. 

Should I consider a DMZ?

A DMZ (De-Militarized Zone), is a secure network attached directly to the secure point of access. This is typically a third interface on the gateway or device running the security application. Implementing a DMZ ensures all traffic goes through the secure access point which provides the highest level of protection against hacker threats. Without a DMZ implementation, all resources are located behind the firewall in a secure network. In this scenario, once a connection attempt is allowed through the firewall to communicate with a resource, it is already inside the perimeter defense. If there was a malfunction at the resource, the security of the entire network could be compromised at that point. 

In the diagram above, if network resources were located behind the firewall, instead of being in the DMZ, any malicious attacks that reached those resources would have already broken through the secure access point - without any further security measures. However, if network resources are located in the DMZ, all traffic to and from network resources must pass through the access point, which is secured with the same security policy. This is the most secure configuration possible.

 

@1999 Check Point Software Technologies Ltd. All rights reserved. Used with permission