“The Check Point Solution not only meets our need for ... filen Safeguard their Internet,...
Transcript of “The Check Point Solution not only meets our need for ... filen Safeguard their Internet,...
©2010 Check Point Software Technologies Ltd. All rights reserved.
QU
ICK
FA
CT
S
CUSTOMER CHALLENGE
SELECTION PROCESS
Beijing MTR Corporation’s core business is operating the Beijing Metro Line 4. Transportation is pivotal to the development of Beijing and subways are an integral part of this infrastructure. State-of-the-art IT systems are the cornerstone of modern subway operations, therefore it’s crucial BJMTR uphold their security protection.
This required:
n Ensure uptime for business critical services including: exchange mail, client management servers, production and business services, and voice and video services
n Provide remote access to usersn Safeguard their Internet, Intranet, and Application Datan Protect network planning and OA office systemsn Manageable solution covering all perimeter operations
Selection Criteria4Protect business critical
applications
4Excellent performance
4Simple security management
4Flexibility for continued growth
4Simple remote access
Why Check Point
“A modernized operation is closely associated with a secured and reliable network. With Check Point we will continue to keep pace with the market development, enabling us to better service society.”
Huang Yingjun, Information Technology Manager, Beijing MTR Corporation
“The Check Point Solution not only meets our need for versatile security protection, but also provides us with flexible scalability for our future deployment.” Huang Yingjun, Information Technology Manager, Beijing MTR Corporation
Customer Profile
n MTR owns and operates the MTR Metro Systems in Hong Kong
n Joint venture between Beijing Infrastructure Co. Ltd, Beijing Capital Group and MTR Corporation
n Property developer that invests and builds railwaysn Employs 1,800 people
Industry
n Transportation
Business Challenge
n Protect business critical applicationsn Secure remote access to internal assets for
authorized usersn Effectively manage 24 subway stations,
along with independent data and disaster recovery centers
n Improve security across the organization
Check Point Solutions
n UTM-1 3070: Providing unified threat managementn Power-1 5070n SSL VPN: Secured remote access gatewayn Smart-1™ Security Management Appliancen SmartEvent Software Blade: Real-time security
event correlation and managementn IPS
Why Check Point
n Outstanding performancen Flexibility to grow along with business needsn Easy administration and centralized
security management
Customer Testimonial Perimeter Security, UTM-1, Power-1, Smart-1, SmartEventBeijing MTR Corporation
Worldwide Headquarters: 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected]. Headquarters: 800 Bridge Parkway, Redwood City, CA 94065 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com
CONTACT CHECK POINT
THE CHECK POINT SOLUTION CHECK POINT BENEFITS
SUMMARY
Protection across: 1) Internet, 2) Intranet, and 3) Application Data
BJMTR desired consistent security across the entire OA network. Check Point solutions are strategically deployed to protect the perimeters of, the Internet and Applications/Data domain, the Internet DMZ double bastion host architecture, and also remote access for mobile workers.
Easily manageable perimeter security with flexibility for growthBJMTR implemented a perimeter solution covering gateways, and allowing for secured access. With the SMART management architecture, BJMTR can centralize the management of all appliances and gateways, assured they will be able to manage their security infrastructure as it expands in the future.
Clustered appliances at the perimeter of BJMTR’s Internet domainTwo Check Point UTM-1 3070 appliances are clustered at the perimeter of the Internet domain with OSPF dynamic routing functionality, enabling real-time updates of network activity. At the Internet gateway, it offers SSL VPN protection to mobile users. In addition, its unified domain AD function module enables unified authentication for users. The Power-1 5070 is clustered at the perimeter ensuring high-performance data access. BJMTR is utilizing the built in IPS feature, and the Check Point Floodgate to scale QoS.
Check Point’s comprehensive security solution upgrades protection for BJMTR’s business
Secure • Flexible • Scalable n Versatile and comprehensive security protectionn Strengthened overall perimeter securityn Simplified managementn Prepared for future growth
Flexible SSL VPN Remote Access
n Allows remote workers and business partners access to the company’s internal network from any location
n Simplifies remote access processesn Reduces Costs
Excellent Appliance Performance
n Clustering UTM-1 3070 appliances decreases down time
n Appliance configuration and performance eliminates bottlenecks in the core network
n Power-1 5070 cluster at the domain perimeter ensures high-performance data access
Unified Management
n Perimeter and network security centrally managedn Single consolen Straightforward interface allows for security auditsn SmartEvent analyzes and correlates events
Internet
OA Servers
BJMTR Remote Workers
DMZ Web Server
UTM-1 3070 UTM-1 3070
SmartEventSoftware Blade
Power-1 5070 Power-1 5070Smart-1
Customer TestimonialBeijing MTR Corporation
Perimeter Security, UTM-1, Power-1, Smart-1, SmartEvent