To that end, Check Point offers what it calls “cooperative enforcement” (all other vendors just refer to this process as plain, old enforcement). This is not ideal, however, because you likely don’t want all your security blocking capabilities sitting out on an endpoint that could be compromised. From there, you can then have the Integrity client do the NAC enforcement by perhaps putting in desktop firewall rules to block network access. ![]() In both cases the Integrity client conducts all of your endpoint assessment. You’ve got some options with this product. Check Point Integrity NGX brings to fruition the integration of the endpoint-security technology purchased with Check Point's ZoneLabs acquisition and Check Point’s signature firewall-product line.
0 Comments
Leave a Reply. |