2022_faq-compliance
2022_faq-compliance
Q: What if I don’t need to be compliant with regulations? Can I still use our
Compliance Software Blade?
A: Definitely. Non-regulated companies can use the security best practices that will help
them improve their overall security. Many of the Early Availability participants had minimal
regulatory exposure yet still found immense value from the best practices.
Q: Where can I find the latest and new standards the Compliance Software
Blade covers?
A: Please refer to Checkmates Toolbox Repository. You may download an XML which you
can then import into the Compliance dashboard.
Q: Will it require the users of the Compliance Software Blade to invest a lot of
time in set up and configuration? And on an on-going basis?
A: The Compliance Software Blade is non-intrusive. This is a real benefit to the customer
as once the Software Blade is turned on, it constantly monitors the security architecture
with next to zero investment on the part of the user.
Q: Which data will be presented, if the customer doesn’t have all Check
Point’s blades?
A: The Compliance Software Blade presents the status of relevant security best practices
according to the installed Software Blades. Security best practices for non-installed
Software Blades can be viewed in a comprehensive table within the Compliance Software
Blade. The purpose is to highlight to the customer what they could be monitoring if they had
more blades from Check Point.
Best Practices
Q: What is a “best practice”?
A: A best practice is a specific recommendation developed by Check Point which defines
the optimal way to configure the Check Point security and management blades. Best
practices receive a compliance status that allows you to understand how well the best
practice is currently implemented in your own environment.
Exclude
Q: Is it possible to exclude non-relevant gateways or clusters from the
Compliance Software Blade?
A: The customer can decide which gateways and clusters are relevant and can exclude all
others, ensuring minimal degradation in the overall security grade.
Technical Information
Q: Does the Compliance Software Blade only check the firewall for
compliance?
A: No. The Compliance Software Blade supports all of the Network Security Software
Blades: Firewall, IPS, IPSec VPN, Application Control, URL Filtering, Identity Awareness,
Anti-Bot, Antivirus, Mobile Access, Anti-Spam and Email Security, and DLP.