Integration
Multi-factor authentication to Check Point systems and firewalls
Secure login (MFA/2FA) to the Next Generation Firewall (NGFW) administration interface
Passwordless login using the second factor using ProID Mobile and other ProID tools
Check Point’s firewalls and cloud-based tools to protect organizations
Check Point Software Technologies is a global company specializing in providing security solutions for information technology and networks. It is known for its network and data security products and services.
Check Point’s key products include:
Firewalls and VPNs (Virtual Private Network) solutions that provide protection for networks from unauthorized access and allow you to securely connect to your network from multiple locations.
Security gateways that integrate various security features, including firewall, antivirus, antimalware, antispyware, and more.
Security solutions to protect cloud infrastructures and applications.
Threat Prevention to prevent threats and detect and remove malware, bots, ransomware, and other threats.
Check Point is considered one of the leading players in network security and is widely used by businesses around the world. Their technologies are designed to protect cloud environments, mobile devices, and other elements of a company’s digital infrastructure.
Supported Authentication Methods
Passwordless
Multi-Factor (MFA)
Two-Factor (2FA)
Push Notifications
One Time Password (OTP)
SMS
Multi-factor (MFA/2FA) login to Check Point’s Next Generation Firewalls (NGFW) interface
ProID enables secure two-factor login to the Check Point interface using a mobile app and other means – a smart card and tokens. Authentication with ProID Mobile is handled via the Radius protocol and allows for a number of authentication methods (push notifications, SMS, OTP, etc.).
Check Point’s Quantum Security Gateway and other Next Generation Firewalls apps can be accessed using biometrics and other methods supported by smartphones.
Island mode with ProID Mobile method
In the event of an internet outage or the need to disconnect the entire organization from the network, we are able to ensure that authentication works in hybrid (offline) mode.