Perimeter Security and Integration with Microsoft AD
Industry: Investment Banking
Protecting our client’s infrastructure and data is of paramount importance to OOAC. The following information demonstrates how our network engineers implemented perimeter security at a client site.
- Perimeter Security
- Gateway Anti-Virus protection
- High availability architecture to ensure maximum uptime
- Remote access & Site to Site VPN solution
- Ease of deployment & Management
- Gateway with IP filtering and NAT capabilities
After analyzing the client requirement statements, OOAC LLC recommended a Checkpoint UTM-1 cluster. This product would meet the requirements outlined by the client and also provide a modular & centrally managed solution. The software blade architecture of a Checkpoint UTM appliance enables the customer to customize their perimeter security needs by simply subscribing to and enabling a specific blade. This architecture eliminates the need to invest in discrete appliances and software, hence reducing the total cost of ownership.
The software blades available are :
Security Gateway Blades
Security Management Blades
A DMZ network was introduced in the existing Network. This provided an additional Zone to host servers securely, without compromising security in the LAN. The IDS/IPS policies were configured for the servers in the DMZ to stop any threat arising from the Public network. Checkpoint provided a single console to manage the cluster and was also capable of managing multiple appliances using the central management console. A UTM-1 Cluster was integrated with Microsoft AD to validate users, improving the security level.