Talk With an Expert

Improving Firewall Security post Acquisition

Improving Firewall Security post Acquisition (PDF, 2.74MB)Published: 18 Jan, 2005
Created by:
Leona Conolly

This paper aims to discuss the challenges in putting together a secure Check Point Firewall-1 solution to protect our existing information and assets and that of our new acquisition. It is assumed that the reader will have a generic knowledge of firewalls, related terms and their use. In the paper the word 'policy' refers to the security document and the word 'rulebase' refers to the Check Point rules.

Improving Firewall Security post Acquisition