No products in the cart.
IntegritySecure – Check Point Software Technologies
Integrity Scotland has over 22 years of experience designing, planning, implementing, reviewing, and troubleshooting, Check Point Software Technologies products.
In response to many client requests over the past year we have created a new professional service called ‘IntegritySecure’. IntegritySecure is aimed at providing the very best security, optimum capacity and performance whilst maximising the best return on investment of your Check Point infrastructure. Our bespoke security assessment process is tailored specifically to your system, environment, and security requirements.
IntegritySecure is offered as three options to cover our clients’ requirements and all remediation tasks and best practice suggestions from options 2 & 3 can be completed by our team of highly skilled, CCSM Elite Certified Security Master qualified security engineers.
Option No.1 (Free)
This option is performed off-site, and information is collected by the client using a series of command outputs from a single non VSX/SP gateway. A basic report detailing our findings will be created and returned to the client.
• We perform a basic gateway review of the following areas.
o System health check
o Overall system performance review
Full Management and Gateway Check-up
This option is performed off-site, and information is collected by the client from both the management server and the gateway. A detailed report of our findings will be returned to the client which includes a full analysis of the system, remediation options and best practice suggestions.
• We perform thorough reviews of the following areas.
o Overall system health checks
o System performance optimisation
o Rule base and software blade optimisation
o Security configuration checks
o Validation of security rules and policies
o Conformity to Check Point’s best practises.
o Scalability review
o Risk Analysis
This option includes all of the features contained within option No.2 but also reaches out to include the surrounding infrastructure and how this interacts with the Check Point implementation. A detailed report of our findings will be returned to the client.
• We perform thorough reviews of the following areas from the perspective of the gateway.
o Review of neighbouring switches and routers
o Review of routing protocols
o Integration of 3rd party products and authentication methods
o Network design and traffic flow analysis