Unparalleled security management that IT professionals have been waiting for.
Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations.
CheckPoint Next Generation Security Administration will be a comprehensive reference to CheckPoint's newest suite of products and will contain coverage of: Next Generation User Interface, Next Generation Management, Next Generation Performance, Next Generation VPN Clients, and Next Generation Systems.
CheckPoint are a company to watch, they have captured over 50% of the VPN market and over 40% of the firewall market according to IDC Research
Over 29,000 IT professionals are CheckPont Certified
This is the first book to covers all components of CheckPoint's new suite of market-leading security products - it will be in demand!
Sprache
Verlagsort
Zielgruppe
Für Beruf und Forschung
Networking Security professional responsible for deploying CheckPoint security solutions
Networking, Security
Maße
Höhe: 229 mm
Breite: 152 mm
Gewicht
ISBN-13
978-1-928994-74-9 (9781928994749)
Copyright in bibliographic data is held by Nielsen Book Services Limited or its licensors: all rights reserved.
Schweitzer Klassifikation
Chapter 1: Introduction to Check Point Next Generation
Chapter 2: Installing and Configuring VPN-1/FireWall-1 Next Generation
Chapter 3: Using the Graphical Interface
Chapter 4: Creating a Security Policy
Chapter 5: Applying Network Address Translation
Chapter 6: Authenticating Users
Chapter 7: Open Security (OPSEC) and Content Filtering
Chapter 8: Managing Policies and Logs
Chapter 9: Tracking and Alerts
Chapter 10: Configuring Virtual Private Networks
Chapter 11: Securing Remote Clients
Chapter 12: Advanced Configurations