Comparing Check Point’s SmartEvent and SmartReporter vs indeni

Check Point’s SmartEvent and SmartReporter blades have made quite some progress over the last two years. The database used for collecting log data has been made more robust and querying capabilities have been expanded.

As we sometimes get asked how indeni compares with these two software blades, I thought I’d spend the time to share our thoughts.

If you read the product datasheets available at the links above, or use it live in your environment, you will notice that both blades focus on security log data. Essentially: how do you identify when there is a threat, where it is and how to stop it? This is very much in line with what customers have been using tools such as HP’s ArcSight for. These are known as Security Information & Event Management (SIEM) solutions.

indeni is generally not focused on identifying security incidents, threats and attacks. Instead, it is an operational tool focused on ensuring the health of various devices, including enterprise network firewalls such as Check Point firewalls. Utilizing SmartEvent and SmartReporter in tandem with indeni will ensure you have both layers of visibility – the health of your security infrastructure as well as what security risks you are dealing with.

For more information, please read the official Check Point and indeni solution brief. You can also go ahead and set up indeni in your environment, takes just 45 minutes.

Try indenifor free for 15 days and see what lurks in your network.

[ninja_form id=67]

 

Related content

Article

Network Device Configuration Standardization – Thoughts on Ethan Banks’ post

Ethan Banks has an interesting newsletter called The Hot Aisle. Worth following if you’re not familiar with it, basically the thoughts of a very…

Read more
Article

Gold Standard Configuration for Network Devices

  Network and security teams in large enterprises spend quite a bit of time defining their “Gold Standard Configuration” for network…

Read more
Article

NERC Compliance Best Practices for Critical Infrastructure Protection (CIP) v5

We have a number of US-based energy grid operators that are leveraging indeni’s capabilities to meet the NERC CIP v5 requirements, that are soon to be…

Read more
Article

Vulnerabilities from SWEET32 in F5 Load Balancers Reveal

How to Mitigate Vulnerabilities from SWEET32 in F5 Load Balancers The SWEET32 vulnerability is targeting long lived SSL sessions using Triple DES in CBC…

Read more