Intrusion Prevention System
Industry: Investment Banking
- Corporate network security setup is an area of expertise for OOAC. In addition to being a seller of security devices, Cisco ASA, and CheckPoint UTM devices, we are able to provide implementation services for our customers.
- We have configured a Check Point UTM-1 Total Security 138 primary and standby and Cisco ASA 5510 to implement high availability security system to our customer.
- Currently, Checkpoint Cluster caters only to remote access VPN users and enables Site to Site VPN connectivity remote office. An important feature of the Checkpoint UTM is the ability to inspect traffic to prevent malicious attacks on the Internal Network. This feature is called an Intrusion Prevention System and works based on attack signatures that are updated at regular intervals. The intrusion prevention module also works in another mode, detection mode. The present configuration at the Data Center is configured in prevention mode such that all traffic passing from the lower security zone (WAN) to the higher security zone (LAN) is inspected. This occurs inline, meaning, all traffic is inspected before passing them to the high security zone (LAN).