• Home
  • Services
    • Managed Detection and Response
    • Security Assessment
    • Phishing Assessment
    • Vulnerability Management
    • CISO as a Service
    • Penetration Testing
    • Outside-in-Security
    • Inside-Out-Security
    • Security Audit
    • Static Code Analysis
  • Insights
  • Contact Us
Menu
  • Home
  • Services
    • Managed Detection and Response
    • Security Assessment
    • Phishing Assessment
    • Vulnerability Management
    • CISO as a Service
    • Penetration Testing
    • Outside-in-Security
    • Inside-Out-Security
    • Security Audit
    • Static Code Analysis
  • Insights
  • Contact Us
Phone-alt Linkedin

Check Point Harmony Authentication

As we continue to work remotely and consume key business resources as services – the shared responsibility model for these externalised services demands strong and intelligent authentication.

The traditional ‘function: security’ spectrum has always tended to be less user friendly, requiring users to present credentials and knowledge, as well as responding to various challenges and checks with authenticating to high-value assets.

Companies are working to ‘right size’ the amount of friction authentication demands from users, to find the balance between sufficiently strong authentication, and the extent this places some requirement on users.

Check Point Harmony includes a range of built-in capabilities to reduce friction while still delivering strong authentication. Some examples of this includes;

Leveraging machine certificates to assure remote network access is only granted via permitted devices.

  • Device enrolment to restrict access to sensitive services such as O365.
  • Network aware and geo-fencing capabilities limit access according to user location.
  • Multichannel challenge/response methods to assure identity within the authentication workflow.
  • Frontend Single Sign-On (SSO) for secured web services to reduce login-layering and password fatigue while still maintaining strong authentication.

These capabilities are integrated across the Harmony range (Endpoint, Mobile, Email and Collaboration and Connect), and deliver strong authentication with an appropriate amount of friction.

Recent blog posts

Common Vulnerabilities and Exposures – October 2022

Read More »

Hacks – October 2022

Read More »

Protecting your data – The CIA Triad – Part One: Confidentiality

Read More »

Need help with this?

Enter your details below and one of our team will get in touch

Other Similar Articles

Common Vulnerabilities & Exposures October 2021

Read More »

Common Vulnerabilities and Exposures – CVE-2022-22954 VMware Workspace ONE Access and Identity Manager

Read More »

Brace168 Products Managed Endpoint & Server Security

Read More »

Hacks – O365

Read More »
View all our blog articles
Linkedin
  • Insights
  • Contact Us
Menu
  • Insights
  • Contact Us

Our Office

Level 2, 157 Walker Street, North Sydney, NSW 2060

Call Us

(02) 9136 6066

Email Address

info@brace168.com