by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : May 2013
number of industry and government reg- ulations for sensitive industries, critical infrastructures and universities, as well as government agencies. Implementing security controls and policies to meet these requirements can be challenging, but it is only the first step in compliance. Systems must be monitored or regularly checked to ensure they remain in compli- ance and documented for reporting and auditing. The new compliance tool is part of the company's software blade architecture, a collection of logical components that lets users enable and configure specific tools and functionality in an appliance as needed. The compliance blade assesses the status of other Check Point gateways and security blades against a catalog of best security practices, regulatory re- quirements and guidelines, including the recommended security controls from the National Institute of Standards and Tech- nology. Once the initial assessment has been made, changes to policy and con- figuration are monitored and users are alerted to the possible impact. If security or compliance is threatened, corrections are suggested. It also can produce auto- mated reports. The compliance blade supports Check Point's firewall, IPsec, VPN, mobile ac- cess, IPS, anti-bot antivirus and anti- spam, identity awareness, application control, URL filtering and data loss pre- vention software blades. Check Point hosts a database of best practices and regulatory requirements that keeps products updated with current information. The challenge in developing the tool was creating the architecture to rationalize data across a variety of tools to link with best practices and regula- tions. "It took us a year-and-a-half to do that," Ram said. USF Health installed the compliance blade in December and got a day of train- ing on using it from the developers. "It wasn't tough to get it installed and running," Bulu said. But he admits that his shop is not taking full advantage of all of the features. "There is more than one way to skin a cat with this blade, to get the information you want when you drill down deep." At present, it is used to mainly to identify problems and potential problems on the dashboard, which codes devices and functions with green, yellow and red, drilling down only on the prob- lem areas to get suggested fixes. "We've found a couple of problems," he said. "Nothing big; they were yellow things, not red things." Just as important as the ability to spot and solve problems is the ability to know and document the status of the security system. "If you have a need to know that you are in compliance and you don't have the staff to constantly audit, this is a great tool," he said. As an early tester of the product, Bulu had one suggestion for tool: Make the dashboard accessible through the Web, which would make it easier to keep upper management informed. "C-level people want to know, 'are we in compliance?'" With Web access they could check it out themselves rather than ask him. • The Virtual Desktop: Extending the Enterprise FREE WEBCAST SERIES: 1ST INSTALLMENT SPONSORED BY NETAPP AND SWISHDATA REGISTER NOW: WWW.GCN.COM/VDI BROUGHT TO YOU BY GCN MAY 2013 • GCN.COM 31