10.07.2015 Views

Provider-1/SiteManager-1 - Check Point

Provider-1/SiteManager-1 - Check Point

Provider-1/SiteManager-1 - Check Point

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 1IntroductionIn This ChapterThe Need for <strong>Provider</strong>-1/<strong>SiteManager</strong>-1 page 9The <strong>Check</strong> <strong>Point</strong> Solution page 14The Management Model page 26The <strong>Provider</strong>-1/<strong>SiteManager</strong>-1 Trust model page 34The Need for <strong>Provider</strong>-1/<strong>SiteManager</strong>-1Secured IT systems are a basic need for modern business environments, and largedeployments face unique security challenges. A large scale enterprise must handle thechallenges of disparate yet interconnected systems. The large scale enterprise often hascorporate security policies that must be tailored to local branch needs, balanced withvital requirement for corporate-wide access, perhaps between branches in differentcountries.Businesses with a large user base often need to monitor and control access toconfidential internal sites, and to monitor communication failures. Administrators mustbe alerted to external attacks, not only on a company-wide basis, but also moreselectively on a department by department, branch by branch basis.Companies with many branches must face security and access challenges that small scalebusinesses do not. For example, an international airline needs to provide access ofvarying levels to ticket agents, managers, airline staff, and customers, through internet,intranets both local and international, and through remote dial-up; all the whilepreventing unauthorized access to confidential financial data.9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!