| Anytime, Anywhere Customer Portal based Access |
Features the browser-based Portal allowing secure anytime, anywhere access to the organization’s critical network security information. |
| Enterprise-Wide Reporting |
Allows the generation of security reports across single or multiple Cisco or Check Point Firewall-1 / VPN-1 devices within an enterprise. |
| Scheduled Reporting |
Permits the scheduling of select security reports, saving substantial time and effort for IT managers that are currently using Check Point’s Firewall-1 Management Module and Cisco PIX Platform. |
| Log Archive Management |
Automatically archives all firewall log files. |
| Custom Query Reporting |
Permits the creation of reports using flexible queries, so data of a specified type and timeframe can be isolated for analysis. |
| Historical Trend Analysis |
Stores device logs in a central secure database making it possible to review and analyze security log data for trends from a historical perspective. |
| Centralized Information Repository |
Keeping track of documentation is easy with the web-based portal access |
| RDBMS database for storage of log data |
The collected log data is stored in a relational database system for easy access and custom queries. |
| Policy Management Archive |
Best practices dictate that security policy changes be closely monitored and that records of such changes be maintained. |