Tips and Tricks 2024 #14 - Why You Need a Best Practices Workshop

Check Point Tips and Tricks
23 Aug 202426:15

Summary

TLDREl webinar presentado por AJ Deosta, arquitecto regional en Carolina del Norte, se centra en las mejores prácticas para talleres de seguridad y optimización de Check Point. Cubre temas como la valoración de la implementación de Check Point, estrategias para mejorar la seguridad y eficiencia, y cómo identificar y solucionar problemas. Ofrece una visión integral de las prácticas de seguridad, sin coste para el cliente, y se adapta a entornos de cualquier tamaño, promoviendo la estabilidad y la mejora continua.

Takeaways

  • 😀 El webinar se centra en las mejores prácticas para talleres de seguridad y optimización de Check Point.
  • 👤 El presentador, AJ DeOsta, es arquitecto regional para soluciones verticales y tiene experiencia en el sector de gobierno y educación.
  • 🛠 Los talleres de mejores prácticas se enfocan en la implementación y operación de Check Point, evaluando flujos de trabajo y desafíos de seguridad.
  • 🔍 El taller de mejores prácticas no es para solucionar solicitudes de servicio existentes, sino para identificar brechas y oportunidades de mejora.
  • 🆓 Los talleres son una oferta gratuita para los clientes, sin requisitos de créditos o de trabajo previo.
  • 📋 Se cubren temas tanto técnicos como no técnicos, incluyendo políticas, reglas, configuraciones de hardware, y prácticas de nube y endpoint.
  • 🛑 Se utiliza herramientas de detección para identificar problemas potenciales y optimizar el uso de recursos.
  • 📈 El objetivo es proporcionar una comprensión más profunda del entorno de Check Point, mejorar la eficiencia, alinearse con las mejores prácticas y aumentar la preparación para incidentes.
  • 🔄 Los talleres pueden ser personalizados y se pueden repetir periódicamente para revisar el progreso y adaptar las estrategias.
  • 📝 Al final del taller, los participantes reciben un documento de revisión detallado con recomendaciones y un plan de acción.
  • 🗓 Los talleres pueden durar desde un par de horas hasta un día completo, dependiendo de la complejidad del entorno y las necesidades específicas.

Q & A

  • ¿Qué es un seminario de mejores prácticas y qué temas cubre?

    -Un seminario de mejores prácticas es una sesión educativa donde se discuten estrategias y procedimientos para mejorar la implementación y operación de un producto o sistema específico. En este caso, se centra en el ambiente de Check Point, evaluando cómo se opera y se implementa, y identificando áreas para mejorar la eficiencia y seguridad.

  • ¿Quién es AJ DeOsta y qué experiencia tiene relacionada con el seminario de mejores prácticas?

    -AJ DeOsta es un arquitecto para soluciones verticales en Check Point, con experiencia en el sector de gobierno local, educación y cuentas comerciales estratégicas. Su experiencia en diferentes organizaciones y aprendizajes lo posicionan para conducir seminarios de mejores prácticas.

  • ¿Cuál es el propósito de un seminario de mejores prácticas de Check Point?

    -El propósito es ofrecer una evaluación holística del ambiente de Check Point, identificar desafíos y áreas de mejora, y proporcionar una estrategia para optimizar la implementación y operación de la solución de seguridad.

  • ¿Por qué un seminario de mejores prácticas no es una visita de ventas?

    -Un seminario de mejores prácticas no tiene como objetivo vender más productos o servicios. Se trata de una oferta gratuita que busca maximizar el valor de la inversión actual del cliente en la solución de Check Point, asegurando que se esté obteniendo el máximo rendimiento y cumplimiento de los objetivos de seguridad.

  • ¿Qué tipo de temas técnicos y no técnicos se abordan en un seminario de mejores prácticas?

    -Se abordan temas técnicos como la base de políticas y reglas, configuraciones de hardware, prácticas de punto final y nube, y análisis de políticas. También se incluyen temas no técnicos como el soporte, la capacitación, los controles ambientales y los factores empresariales.

  • ¿Cómo se realiza la evaluación durante el seminario de mejores prácticas?

    -La evaluación se realiza a través de una serie de entrevistas, preguntas y respuestas, y el uso de herramientas de detección. Se recopila información y se analiza para producir un informe de entrega que prioriza las observaciones y las áreas de mejora.

  • ¿Qué se espera que el cliente haga antes de iniciar el seminario de mejores prácticas?

    -No hay requisitos previos específicos para el cliente. Sin embargo, si el cliente tiene información específica o un problema conocido, como una puerta de enlace subdimensionada, se puede abordar durante el seminario.

  • ¿Cómo se puede personalizar un seminario de mejores prácticas para diferentes equipos tecnológicos?

    -Un seminario se puede dividir en sesiones específicas para abordar diferentes tecnologías, como nube o dispositivos móviles, adaptándose al horario y necesidades de cada equipo.

  • ¿Qué tipo de clientes pueden beneficiarse de un seminario de mejores prácticas de Check Point?

    -Clientes de todos los tamaños, desde pequeñas municipalidades con pocos usuarios hasta grandes operadores de telecomunicaciones con miles de puertas de enlace, pueden beneficiarse de un seminario para optimizar su ambiente de Check Point.

  • ¿Cómo se puede acceder a los documentos y resultados del seminario de mejores prácticas?

    -Los participantes tienen acceso a un documento de muestra antes del seminario y, al final de la sesión, reciben una copia del informe completo con las evaluaciones y recomendaciones personalizadas.

  • ¿Es posible volver a realizar un seminario de mejores prácticas después de haberlo hecho anteriormente?

    -Sí, se anima a los clientes a repetir el seminario periódicamente para revisar el progreso, ajustar las estrategias y abordar nuevos desafíos o cambios en el entorno de Check Point.

Outlines

00:00

😀 Introducción a los Talleres de Buenas Prácticas

El primer párrafo presenta un webinar sobre las mejores prácticas en el uso de Checkpoint. AJ Deosta, arquitecto regional en Carolina del Norte, hablará sobre los talleres de buenas prácticas y su valor. AJ tiene experiencia en el sector gubernamental y educativo, y su experiencia previa en el sector comercial le permite abordar diversos problemas y aprendizajes de diferentes organizaciones. Se mencionan dos tipos de talleres: uno de seguridad y otro de buenas prácticas, con un enfoque en la implementación y operación de Checkpoint.

05:01

🔍 Detalles del Taller de Buenas Prácticas

En el segundo párrafo, AJ profundiza en los detalles del Taller de Buenas Prácticas, enfocándose en la implementación y operación del ambiente de Checkpoint. Se discuten los objetivos del taller, que incluyen identificar y abordar desafíos y optimizar el uso de características y productos de Checkpoint. También se aclara que el taller no es para resolver solicitudes de servicio existentes, configurar productos específicos o realizar ventas, sino más bien para entender y mejorar la implementación general de Checkpoint en el entorno del cliente.

10:01

🛠️ Contenido y Proceso del Taller de Buenas Prácticas

El tercer párrafo describe el proceso y el contenido del Taller de Buenas Prácticas, que incluye temas tanto técnicos como no técnicos. Se mencionan áreas como soporte, capacitación, controles ambientales y temas técnicos como políticas, reglas, virtualización y configuraciones de hardware. Se resalta la importancia de la optimización de la base de políticas y el uso de herramientas de detección para evaluar el tamaño y el rendimiento de las puertas de enlace. El objetivo es identificar problemas y áreas que requieren mejoras.

15:04

📋 Ejemplo de Informe del Taller de Buenas Prácticas

El cuarto párrafo presenta un ejemplo de un informe de revisión de buenas prácticas, que incluye capítulos con preguntas y calificaciones para evaluar diferentes aspectos del entorno de Checkpoint. Se proporcionan detalles sobre cómo se estructura el informe, con secciones que cubren desde hardware y virtualización hasta políticas y manejo de incidentes. El informe también incluye gráficos de radar para visualizar de manera clara las áreas que requieren mejoras y secciones con información de referencia para ayudar en la implementación de las recomendaciones.

20:09

⏱️ Tiempo y Requisitos Previos para el Taller

En el quinto párrafo, se aborda el tiempo invertido en el Taller de Buenas Prácticas y los requisitos previos para su realización. Se menciona que el tiempo puede variar desde unas pocas horas hasta medio día, dependiendo de la complejidad del entorno. También se aclara que no hay requisitos previos estrictos, aunque se pueden realizar análisis específicos si se tiene información previa sobre problemas potenciales. Además, se habla sobre la flexibilidad para dividir el taller en sesiones temáticas según sea necesario.

25:09

🤝 Conclusión y Siguientes Pasos

El sexto párrafo concluye la presentación, abogando por la realización del Taller de Buenas Prácticas independientemente del tamaño del entorno de Checkpoint. Se enfatiza la importancia de la evaluación periódica y se incentiva a los participantes a programar un taller con su equipo de cuentas. Se mencionan las ventajas de realizar el taller, como la mejora de la estabilidad y la dirección de su entorno de Checkpoint, y se cierra la sesión con un agradecimiento y un recordatorio de futuras sesiones.

Mindmap

Keywords

💡Taller de mejores prácticas

Un taller de mejores prácticas es una sesión educativa y de capacitación que se centra en enseñar y discutir los procedimientos óptimos para la implementación y operación de tecnologías específicas. En el guion, este taller se utiliza para abordar cómo se opera y se implementa Checkpoint, con el objetivo de asegurar que cada parte del entorno cumpla con los objetivos de seguridad y rendimiento esperados. Se menciona que el taller no es para solucionar problemas de soporte existentes, sino más bien para identificar y priorizar mejoras en las prácticas de seguridad a partir de una perspectiva no sesgada.

💡Checkpoint

Checkpoint es una solución de seguridad de red que se menciona en el guion como el enfoque principal del taller de mejores prácticas. Se espera que los participantes obtengan una comprensión más profunda de su entorno Checkpoint y se alineen con las mejores prácticas de Checkpoint para mejorar la eficiencia y la preparación para incidentes. El término se utiliza para referirse tanto a la tecnología como a los objetivos de seguridad que se buscan al realizar el taller.

💡Seguridad

La seguridad es un tema central en el guion, ya que el taller de mejores prácticas se enfoca en evaluar y mejorar la postura de seguridad de los participantes a través de la optimización de su implementación de Checkpoint. Se destaca la importancia de detectar posibles problemas antes de que se conviertan en incidentes mayores y de estar preparado para manejar incidentes de seguridad inevitables.

💡Tecnología

La tecnología es el eje central del taller, ya que se trata de mejorar la implementación y operación de soluciones de seguridad como Checkpoint. Se abordan tanto aspectos técnicos como no técnicos, como la formación de soporte, controles ambientales y configuraciones de hardware, para garantizar que la tecnología funcione de manera óptima y segura.

💡Optimización

La optimización es un proceso mencionado en el guion para mejorar la eficiencia y el rendimiento del entorno de Checkpoint. Esto incluye la revisión y mejora de políticas y reglas, así como la evaluación de la configuración de hardware y la gestión de puntos finales y en la nube. Se busca optimizar estos elementos para que el sistema funcione de manera más efectiva y segura.

💡Políticas y reglas

Las políticas y reglas son aspectos clave de la seguridad de red que se abordan en el taller. Se menciona que a menudo es un tema grande para los clientes, ya que es fácil que las políticas se salgan de control con el tiempo. El taller busca ayudar a los clientes a optimizar su base de políticas y reglas, eliminando objetos no utilizados y mejorando la eficiencia general del sistema.

💡Capacitación

La capacitación es un componente importante del taller de mejores prácticas, ya que se busca asegurarse de que el personal esté capacitado y certificado para manejar la tecnología de Checkpoint de manera efectiva. Se menciona la importancia de tener un equipo con el nivel adecuado de formación para implementar cambios y realizar actualizaciones.

💡Herramientas de detección

Las herramientas de detección son utilidades mencionadas en el guion que se utilizan para investigar y analizar el entorno de seguridad. Estas herramientas ayudan a identificar problemas potenciales y a ajustar el rendimiento de los dispositivos de seguridad, como se muestra en el ejemplo del balanceo dinámico y la optimización del tamaño de la cola.

💡Acciones correctivas

Las acciones correctivas son recomendaciones y pasos de seguimiento que surgen de la realización del taller de mejores prácticas. Se menciona que el taller no es para culpabilizar al equipo de seguridad existente, sino para identificar áreas que requieren más atención y mejora. Las acciones correctivas son un producto final del taller, que ayudan a los clientes a priorizar y abordar las mejoras necesarias en su entorno de seguridad.

💡Inversión de tiempo

La inversión de tiempo se refiere al compromiso de los participantes para dedicar horas a participar en el taller de mejores prácticas. Aunque el tiempo exacto varía según el tamaño y complejidad del entorno, se menciona que el compromiso es flexible y que el valor obtenido supera el esfuerzo invertido, ya que se busca mejorar la estabilidad y la dirección de su entorno de Checkpoint.

Highlights

Webinar sobre mejores prácticas de talleres de Check Point.

Presentador especializado en soluciones para gobiernos locales y educación.

Talleres de mejores prácticas y seguridad ofrecen una visión integral y específica, respectivamente.

El taller de mejores prácticas se enfoca en la implementación y operación de Check Point.

No se trata de solucionar problemas de servicio existentes, sino de identificar brechas.

Talleres sin costo para el cliente, sin compromisos adicionales.

Cubre tanto aspectos técnicos como no técnicos, incluida la formación y controles ambientales.

Optimización de la base de políticas y reglas es un tema clave en muchos casos.

Uso de herramientas de detección para evaluar el tamaño adecuado de la pasarela y rendimiento.

El valor de los talleres es una mejor comprensión y eficiencia en el uso diario de Check Point.

Mejora de la preparación para incidentes y conexión con herramientas y recursos adecuados.

Los talleres no buscan culpabilizar, sino entender y mejorar el entorno de seguridad.

Ejemplos de problemas detectados, como balanceo dinámico desactivado y ajustes de tamaño de cola.

Proceso de realización del taller, desde introducción hasta la entrega del plan de acción.

El tamaño del entorno no limita la utilidad del taller, desde pequeñas municipalidades hasta grandes operadores de telecomunicaciones.

Importancia de entender la funcionalidad de negocio y operativa de Check Point en el entorno.

Ejemplo de documento de revisión de mejores prácticas con capítulos y evaluaciones detalladas.

Los participantes obtienen una copia del informe completo y herramientas utilizadas.

Posibilidad de realizar el taller de manera recurrente para evaluaciones periódicas.

El taller puede adaptarse a diferentes tecnologías y equipos de nube.

No hay requisitos previos para iniciar el taller, se puede enfocarse en áreas específicas.

Aplicabilidad del taller para socios con múltiples clientes y en escenarios de renovación de contratos.

Se puede acceder al documento de muestra y al informe final del taller.

El número de pasarelas y administradores manejados en el taller no tiene límite.

Transcripts

play00:03

okay hello and welcome everybody thank

play00:05

you for joining today's tips and tricks

play00:07

webinar today's topic as you can see is

play00:10

on best practices workshops um

play00:13

presenting today is one of our regional

play00:15

Architects AJ deosta AJ's in new I'm

play00:19

sorry North Carolina almost said new

play00:21

something and he uh he works for our

play00:23

sled team right AJ so that state local

play00:26

government and education so I don't know

play00:29

how many of you are on that side of the

play00:31

fence but um obviously we have those on

play00:34

the commercial side too so um AJ what do

play00:37

you have for us today yeah um no thanks

play00:40

for the intro um yeah so we're gonna be

play00:42

talking a bit about best practices

play00:44

workshops uh what they are what they

play00:47

entail uh the value of them um and uh

play00:51

some of the the use cases that that

play00:52

we've seen from doing quite a few of

play00:54

these um to give a a brief intro of

play00:57

myself I'm AJ Del aosta I'm architect

play01:00

for vertical Solutions uh sort of sort

play01:03

of the other side of the house from from

play01:04

a checkpoint business perspective

play01:07

primarily I handle uh State local

play01:09

governments

play01:10

education um I came from the commercial

play01:13

side originally having dabbled with you

play01:15

know strategic accounts large commercial

play01:18

accounts territory development um so I

play01:21

had the privilege to see quite a bit

play01:23

from a lot of different customers and a

play01:26

lot of those lessons learned throughout

play01:28

the years and from from different

play01:30

organizations were the driving force to

play01:33

building these these workshops and and

play01:35

to building these

play01:36

reports um I'll dive right into it and

play01:40

basically discuss the workshop uh

play01:42

offerings overall um so workshops come

play01:46

in two different flavors uh we offer a

play01:48

security workshop and a best practices

play01:51

Workshop primarily we're going to be

play01:53

focused on the right side here the best

play01:55

practices Workshop the security

play01:58

Workshop is meant to be a uh much more

play02:02

holistic highlevel view of your security

play02:06

posture uh so that it extends Beyond

play02:09

just you know the checkpoint offerings

play02:11

or even just the the checkpoint

play02:13

deployment it's going to cover you know

play02:14

a really wide swath of of different

play02:17

Technologies where the best practices

play02:20

Workshop is is a bit more focused we're

play02:22

going to be be really you know zeroing

play02:24

in on the checkpoint deployment as a

play02:27

whole making sure that each part of the

play02:29

checkpoint environment each part of the

play02:31

ecosystem is is behaving is it's giving

play02:34

us the value that that we expect from it

play02:37

you know and is it is accomplishing that

play02:39

that security

play02:42

goal let's dive right into the best

play02:45

practices

play02:48

Workshop

play02:51

so what we'll cover is what so what is a

play02:55

best practices Workshop um again we're

play02:57

going to be focusing specifically on the

play02:59

checkpoint environment as a whole we

play03:01

want to look at how the checkpoint is

play03:04

being operated and implemented you know

play03:06

what is the workflow of of the

play03:08

day-to-day you know Administration you

play03:11

know what are the challenges that that

play03:12

the security team is is facing you know

play03:15

are are all the products and features

play03:18

meeting the goals and meeting the needs

play03:20

uh of the environment and if there is a

play03:22

gap let's find out where that Gap is um

play03:25

so as you can see here it's it's really

play03:27

meant to prioritize and strategy those

play03:30

kind of macro uh security practices from

play03:33

from a checkpoint perspective um and to

play03:36

kind of put lines on the field of of

play03:38

what it is not so it is not meant to

play03:40

troubleshoot existing service requests

play03:43

if there are outstanding requests that

play03:45

need escalation additional context um

play03:49

I'm happy to assist it in that way uh as

play03:51

well I can be a touch point for for

play03:53

escalation But ultimately you know Tac

play03:56

uh Tac is is going to be our go-to for

play03:59

for break f

play04:00

these are not professional service

play04:02

engagements both Workshop offerings are

play04:05

zero cost to the customer um there is a

play04:09

there's not a a you know statement of

play04:11

work there's no you know credits that

play04:13

that are need uh needed to be turned in

play04:16

uh these are free offerings that we can

play04:19

you know basically sit down and and

play04:21

strategize and look at things um you

play04:24

know from a you know very unbiased

play04:26

perspective and figure out you know

play04:28

where the where the improvements need to

play04:29

happen

play04:30

happen uh it is not meant to focus on a

play04:33

specific product configuration but often

play04:36

times having done a best practices

play04:37

Workshop we discover you know maybe we

play04:40

should sit down and have a deep dive on

play04:43

say Maestro or smart event or you know

play04:46

one of the other uh you know products

play04:48

that that we have so we really have that

play04:50

you know technical granular

play04:52

understanding of of of how everything

play04:54

works and finally it's not meant to be a

play04:57

sales pitch um in no way I incentivized

play05:00

in having a customer buy millions of

play05:02

dollars of of equipment that doesn't

play05:05

serve the goal uh that was initially put

play05:08

forth we want to make sure that you're

play05:11

uh rendering the value of of what you

play05:14

paid for from from a checkpoint

play05:15

perspective making sure you're getting

play05:17

the most out of the gear that was

play05:19

purchased and

play05:23

implemented so what's covered in a best

play05:25

practices Workshop so we cover items

play05:29

both non-technical and Technical in

play05:32

nature from from that operational

play05:35

perspective we'll touch on items you

play05:38

know support training environmental

play05:39

controls kind of non-technical almost

play05:41

business driver type type elements you

play05:44

know is the team uh at a certification

play05:47

level where you know they they feel

play05:48

comfortable implementing changing doing

play05:50

upgrades you know and then we'll slowly

play05:53

transition into to more technical topics

play05:56

policy and Rule base you know what kind

play05:58

of business cont anity plans do we have

play06:00

in place is there any virtualization

play06:02

happening Hardware configurations is is

play06:05

always a big one um endpoint and Cloud

play06:08

best practices uh are touched on as

play06:12

well I will point out uh policy and

play06:14

rulebase is often a really big topic for

play06:17

for a lot of customers um at least the

play06:20

the government customers that I talked

play06:22

to policies it's very easy for a policy

play06:25

to get pretty out of control you're

play06:27

adding rules you're taking on projects

play06:29

you have contractors come in maybe

play06:31

you're inheriting uh your policy from a

play06:33

previous administrator spending a time

play06:36

to optimize your rule base optimize

play06:39

those you know unused objects goes a

play06:41

long way in just you know making

play06:44

everything just flow and and operate

play06:47

much more

play06:48

smoothly we'll also leverage Discovery

play06:50

tools so any Discovery tool we use in in

play06:53

our you know investigation and research

play06:56

you'll get a copy of and those tools can

play06:58

be anything from you know Pro support uh

play07:00

Mak you know we have visibility to to

play07:02

the the gateways from from a proactive

play07:05

perspective Gateway sizing you know if

play07:08

we have a Gateway that may be undersized

play07:10

or maybe you know choking uh at you know

play07:13

certain times of the day due to policy

play07:14

volume or or just traffic volume let's

play07:17

find out why and see if we can uh tune

play07:20

some more performance out of it policy

play07:23

analysis I mentioned before and then

play07:25

just dis just general discussion and

play07:27

whiteboard we want to hear from you what

play07:30

the the challenges are where the pain

play07:32

points are and how we can help resolve

play07:38

those it's the value the takeaways from

play07:41

it you're hopefully going to get a much

play07:43

deeper understanding of of your

play07:45

checkpoint environment you can improve

play07:47

just that overall efficiency that the

play07:49

day-to-day usage of it uh you'll align

play07:52

with checkpoint best practices uh so you

play07:55

can say you know checkpoint reviewed my

play07:57

environment and you know didn't see any

play07:59

uh

play08:00

you know red flags or or blatant gaps in

play08:03

in the wall and and we we're good to go

play08:06

you'll have an improved incident

play08:08

Readiness uh that has come up a few

play08:10

times with customers because it's not

play08:12

even a matter of if I'll have an

play08:14

incident it's when I'll have an incident

play08:16

and after you do a workshop or best

play08:19

practices Workshop because you have a

play08:21

deeper understanding you're much more

play08:23

able to react you're much more able to

play08:25

handle those incidents that are you know

play08:27

inevitably coming your way

play08:30

and I'm going to hopefully connect you

play08:32

guys to the proper tools and resources

play08:35

so if we have to do a deep dive on you

play08:37

know very specific product if we need to

play08:40

have you know really in-depth

play08:42

conversations with R&D or or a product

play08:44

specialist uh we can absolutely make

play08:47

that happen and uh you know build those

play08:50

build those relationships and touch

play08:52

points excuse me and finally it's not

play08:55

meant to point fingers uh we the last

play08:58

thing we want to do is is have it be a

play09:01

an examination exercise where the

play09:04

existing security team is is you know

play09:06

meant to look back that is not the goal

play09:08

here we just want to understand you know

play09:11

what areas of the environment what

play09:12

aspects just need more attention need

play09:15

Improvement you know leverage a best

play09:17

practices Workshop to help justify you

play09:20

know maybe an additional spend from from

play09:23

your you know the powers it be maybe we

play09:25

need to think about more uh you know

play09:28

education you know let let's find out

play09:31

how we can improve things from from a

play09:33

holistic perspective as well as a

play09:35

technical

play09:37

perspective so we'll go into a few

play09:40

examples of what we can reveal

play09:43

here so Performance Tuning um and this

play09:47

is a a screenshot from a pro report by

play09:49

the way this looks familiar for for some

play09:52

folks out there um Dy Dynamic balancing

play09:55

is not turned on uh this is one of those

play09:57

features that by default should be

play09:59

turned on and it makes a big difference

play10:01

as far as performance and just overall

play10:04

traffic um you know traffic handling if

play10:07

there was a particular reason Dynamic

play10:09

balancing was turned off let's find out

play10:11

why there it's no certain rules certain

play10:14

diagnostic scripts um can sometimes

play10:17

break Dynamic balancing maybe it was

play10:20

turned off to do some debugging and then

play10:22

somebody just forgot to turn it back on

play10:25

uh but it's a good thing that we caught

play10:26

it in this report and it's you know in

play10:28

this case it was a pretty

play10:29

straightforward uh fix to just turn it

play10:32

back on and oh all of a sudden our

play10:34

utilization drops you know 20% for that

play10:41

Gateway detecting smoke before the fire

play10:45

oftentimes we'll start to see problems

play10:49

or potential problems before they become

play10:52

larger ones or or or worst case scenar

play10:55

even outages uh so in this case we had

play10:58

an interface that was you know basically

play11:00

just being overrun core core XL being

play11:03

being overrun and the que just wasn't

play11:05

able to handle this this Deluge of

play11:07

traffic and we were dropping packets you

play11:09

know 15,000 packet drops depending on

play11:12

the size of environment can be a whole

play11:14

lot or or very little um and in this

play11:18

case the the customer was unaware uh

play11:20

that that this this was even happening

play11:22

and as we watched over the next few days

play11:25

that 15,000 figure slowly started to

play11:27

climb and as soon as we increase the Q

play11:30

size we we got that packet drop uh issue

play11:33

under control and and uh you know no no

play11:36

outages or or affected you know tickets

play11:38

were were ever opened uh for for that

play11:41

particular

play11:45

one so when you conduct a workshop um

play11:50

whether it be a security one a security

play11:52

Workshop or a best practice Workshop

play11:54

process flow is is very straightforward

play11:57

we do an introduction call not very

play11:59

uh dissimilar to conversation we're

play12:02

having right here um I'll distribute the

play12:06

the documents the the blank documents

play12:08

and and basically the the stencil that

play12:11

we're going to follow along the way for

play12:12

reference we'll examine the areas that

play12:15

we want to focus on if there's a

play12:16

particular section that we really want

play12:18

to you know deep dive on or or you know

play12:21

add a little bit more content to we can

play12:23

certainly do that um and then we'll go

play12:26

into an interview session and that

play12:28

interview we'll we'll basically be

play12:30

running through the the questions that

play12:32

that'll show in a minute building out

play12:34

the report and then doing uh some data

play12:36

collection and and research and that's

play12:39

going to come from the the tools that I

play12:41

showed

play12:43

earlier after we take the output of our

play12:46

tools our interview um interview

play12:50

information we'll then take that back

play12:53

and digest all of that and then produce

play12:56

a uh delivery document and an action

play12:58

plan

play12:59

and that document will prioritize the

play13:02

findings that we found the the gaps that

play13:05

we might be concerned about and then we

play13:07

can have a a conversation on how we want

play13:10

to attack this how how do we want to

play13:12

prioritize this is this something that

play13:14

we can easily handle ourselves um you

play13:17

know that the customer can do themselves

play13:18

that you know the checkpoint sales team

play13:20

can assist or do we have to have a

play13:23

conversation with a trusted partner or

play13:25

Professional Services you know maybe

play13:27

some larger upgrades and and

play13:28

implementation a work uh needs to be

play13:30

done um and that that's really what we

play13:33

want to structure out and figure and

play13:35

figure

play13:40

out the reviews themselves can take

play13:42

anywhere from a few hours to a full day

play13:45

uh depending on the complexity of the

play13:47

environment and and how granularly we we

play13:50

need to go uh we have done uh best

play13:53

practice workshops for customers as

play13:56

small as I believe this C was a

play13:59

municipality in rural Kentucky he had

play14:03

seven users and he was the admin for

play14:05

seven users he he wanted to do it and uh

play14:08

I I think they got a lot of value from

play14:10

it um all the way up to Major Telos um

play14:14

and Telos that I'm sure you're using

play14:16

right now National

play14:20

level uh we need to have an

play14:22

understanding of the business

play14:23

functionality as well as as as

play14:25

operations so I mentioned that earlier

play14:27

we're not just looking at you know

play14:29

configurations and buttons and switches

play14:31

within the gateways we want to

play14:33

understand as a whole how where does

play14:35

checkpoint sit in the environment what

play14:37

are the driving factors that that

play14:39

influence how the checkpoint is is

play14:42

implemented and again if there's any

play14:44

specific areas of Interest we certainly

play14:46

want to cover

play14:48

those at the end you'll see a completed

play14:51

review document I'll show a sample here

play14:53

in a few in a few minutes the output of

play14:56

any tools that we used so whether that's

play14:59

uh you know Gateway sizing or Pro report

play15:03

you you'll all get copies of that and

play15:06

then after we complete our engagement

play15:07

we'll have touch points along the way to

play15:09

to you know make sure that we're

play15:11

following the path and keeping up with

play15:14

with our changes and making sure you

play15:16

know that doesn't kind of slip through

play15:17

the cracks and and get lost and and uh

play15:21

you know keep things moving in the right

play15:26

direction all right

play15:30

let me switch to a quick sample report

play15:32

and then we'll open it up to

play15:35

questions so to visualize what it what

play15:37

it looks like so B basically you're

play15:40

going to get a Best Practices review

play15:43

document these are the chapters that

play15:44

we're going to cover and each chapter

play15:48

has a series of questions that we give a

play15:50

rating to

play15:52

ratings very basic either doesn't apply

play15:55

doesn't exist it exists but is not ideal

play15:59

or it's perfect and we wouldn't change a

play16:02

thing and then based on you know the

play16:05

discussion we have the research we do

play16:06

with our tools we can build a ratings a

play16:09

rating for for each item there'll also

play16:12

be reference information for each item

play16:14

so if we're discussing something like an

play16:16

RMA for example you know making sure we

play16:19

have a good RMA uh hygiene you know

play16:21

having documentation ready local having

play16:24

locally stored copies of code being

play16:26

familiar with you know isomorphic

play16:29

utilities and if we ever need to

play16:31

understand what the official RMA process

play16:33

is the link is is attached right in the

play16:35

report same goes for other items like

play16:38

such as life cycle certification paths

play16:41

uh etc etc so as you move through the

play16:43

document it's it's a good snapshot in

play16:46

time but also a good reference material

play16:48

to go back to and say oh yeah we

play16:50

discussed SNMP monitoring where's that

play16:53

SK to to configure SNMP right there in

play16:56

the dock

play16:59

each

play17:01

section is then boiled down into a radar

play17:05

graph to give us an output just a handy

play17:08

visualization on what's going very well

play17:11

and What needs a little help so in this

play17:14

scenario Hardware was excellent no

play17:17

configuration uh modifications needed

play17:20

everything was turned on running really

play17:22

smoothly consolidation and

play17:24

virtualization was also very good but we

play17:26

need to spend a little time on the

play17:28

policy and Rule BAS it was a few years

play17:30

old it had seen a lot of different

play17:31

administrators it had a lot of unused

play17:33

objects cleanup is fairly

play17:35

straightforward but you know we just

play17:36

have to make time to to get it done uh

play17:39

training was a gap for this customer

play17:41

they had again inherited it from a

play17:43

previous administrator they weren't you

play17:45

know all that familiar with checkpoint

play17:48

uh before coming on so let's make sure

play17:50

you have a clear path to training you

play17:52

have the training resources

play17:56

available and basically just spelling

play17:58

those out so uh another recommendation

play18:01

here was was endpoint management

play18:03

resiliency so this customer wasn't able

play18:05

to leverage cloud-based

play18:07

management um or or it was something

play18:10

that they were at least considering uh

play18:12

or not sure about so all right if we

play18:14

can't do cloud-based endpoint management

play18:16

let's at least have some kind of

play18:18

redundancy you know whether virtualized

play18:20

or or an appliance or or whatever it is

play18:23

uh training I mentioned earlier pointing

play18:25

you guys in the right direction of

play18:27

whether it's you know starting up ccsa

play18:29

or there's all types of uh low cost or

play18:33

no cost training resources out there and

play18:37

policy review and optimization I

play18:39

mentioned earlier and and why that's

play18:41

important we take those recommendations

play18:44

and items and then essentially have a

play18:47

discussion on how we want to prioritize

play18:49

that and that's is our go forward plan

play18:51

so in this case we wanted to bring the

play18:53

migration uh to Smart One Cloud at least

play18:56

for Gateway management right to the top

play18:57

that was something they were very

play18:58

interested in review the policy and Rule

play19:01

base of yet smart optimize was their

play19:04

next step enrollment and training and

play19:07

and and

play19:08

certifications and then uh making sure

play19:10

we keep up with with endpoint client

play19:12

version updates uh was was was the final

play19:16

item and as I mentioned earlier once we

play19:18

have these down on paper we can you know

play19:21

really decide okay you know this is

play19:22

something we're we're able to handle as

play19:24

as a local team this is this is not a

play19:26

big deal or if this is just going to be

play19:28

way too labor intensive too big to take

play19:30

on let's talk to our partner let's talk

play19:32

to Professional Services and uh you know

play19:36

bring bring our radar grath all the way

play19:38

out to uh you know three out of three

play19:40

across the

play19:42

board so yeah essentially that is how a

play19:46

a best practices uh Workshop

play19:49

runs uh obviously each review and

play19:53

workshop is a little bit different uh

play19:55

but yeah opening uh opening uh our time

play19:58

up here to any questions that might be

play20:00

out there yep we have some questions for

play20:02

you AJ uh first off what's the customers

play20:08

investment in this as far as time and

play20:10

prerequisites for this best practice

play20:12

Workshop so time the time

play20:15

investment we're we're very flexible in

play20:18

that way so the reviews themselves can

play20:20

take anywhere from a few hours to I mean

play20:24

half a day is is really really that's a

play20:27

big one uh for us the Strategic Telco

play20:30

customers that we've done this with

play20:32

those take multiple days just because

play20:34

they're they're so complex but I would

play20:36

say on average for you know an

play20:39

organization uh you know maybe a couple

play20:41

dozen gateways um even multi-domain

play20:45

environments half a day to a few hours I

play20:48

would say could you break it up there's

play20:50

one I just thought of can you break it

play20:53

up for different technology say you're

play20:54

only dealing with the cloud teams just

play20:56

do a cloud best practice absolutely and

play20:58

we've done that before so I've I've done

play21:02

um workshops in basically three parts so

play21:04

session one is the non- bus stuff

play21:07

session two is is you know the policy

play21:09

and Gateway side and then the the last

play21:12

uh section is just the cloud and and

play21:14

mobile folks so yeah we can you know

play21:17

splice it up however works for for

play21:18

everyone's schedule okay and I'm sorry

play21:21

if you didn't I didn't hear your answer

play21:23

here but uh be I know you said the time

play21:25

that the customer but what about

play21:27

prerequisites before you get there is

play21:29

there anything that customer should do

play21:31

before you kick off this best

play21:33

practice no I mean not necessarily for

play21:36

for a security Workshop yes there are

play21:39

some prerequisites involved so for for a

play21:41

security Workshop we're going to want to

play21:43

we're going to need some some additional

play21:45

sensors in place some additional data

play21:47

Gathering um as far as is saying I want

play21:50

to start a best practices Workshop

play21:52

there's no

play21:53

prerequisites uh unless you know you can

play21:57

tell us you know day one we know this

play22:00

Gateway is undersized let's you know

play22:02

launch the sizing utility and find out

play22:05

how undersized it is um that's not

play22:08

something that necessarily has to be

play22:09

done ahead of time but you know that's

play22:11

something we we'll want to look at uh

play22:13

you know going going into the workshop

play22:15

gotcha uh this one maybe it'll make more

play22:17

sense to you but uh does this also apply

play22:20

to Partners who have multiple

play22:23

customers absolutely yeah so this can be

play22:26

done um for for any number of you know

play22:30

checkpoint customers or or you know use

play22:32

cases um I mean we we have customers

play22:35

that are doing these on a recurring

play22:38

basis so we have a a number of of uh

play22:42

municipalities actually state

play22:44

governments that have run one of these

play22:47

got a lot of value from it really you

play22:49

know got a real clear Direction on on

play22:52

where and how they want to move things

play22:54

forward they said great come back to us

play22:56

in six months come back to us in a year

play22:57

run it again

play22:59

um and you know we hopefully we'll see

play23:01

an improvement over time yep absolutely

play23:05

I think that covers it for questions so

play23:08

thank you AJ great information um but

play23:11

like you said here you know these are

play23:13

very valuable you know no cost to you

play23:15

except for some time investment but you

play23:17

know no matter the size of your

play23:19

environment this can make your envir

play23:21

checkpoint environment more stable you

play23:23

know Direction you know what tools are

play23:25

out there to help you be more stable so

play23:27

you know no matter what size you are I

play23:30

highly encourage you talking to your

play23:31

account team and get one of these

play23:33

scheduled and like AJ said you know year

play23:35

over-year doing another check in down

play23:37

the road and make sure you're still on

play23:38

the right path um oh somebody just asked

play23:41

if we had one before can we do it again

play23:43

absolutely of course it's encouraged

play23:46

yeah yeah encouraged to do it again yes

play23:49

B yeah abuse your team to get another

play23:50

one scheduled just to check in and see

play23:52

where you are and make sure you're

play23:53

moving in the right direction and

play23:55

obviously as your environment Go grows

play23:57

or you get new equipment or new products

play24:00

there's other things that we can include

play24:01

in this too so absolutely you know

play24:03

whatever works for you I'm glad you

play24:05

mentioned that Rob actually the the use

play24:08

cases we've seen time and time again um

play24:11

ahead of a renewal uh maybe ahead of an

play24:14

Infinity contract or even just a level

play24:17

set you know litness test of you know

play24:19

how secure is my environment um Ju Just

play24:23

any of those use cases you you see a lot

play24:25

of value

play24:26

there absolutely oh got some more

play24:29

questions here for you one is can I have

play24:31

access to that document do you mean your

play24:34

doc I was just going to clarify do you

play24:35

mean your document after the workshop or

play24:37

do you mean the sample one that AJ is

play24:40

showing if you can just throw that

play24:42

answer in the in both scenarios the

play24:44

answer is yes okay you can have the

play24:46

sample Doc and then at the end of the uh

play24:48

engagement you get a copy of the

play24:51

completed report yeah okay great uh

play24:54

another one here how many gateways and

play24:56

managers will be handled with this best

play24:58

practice Workshop as as many as we need

play25:02

to so for the large Telco we were

play25:05

dealing with thousands of gateways um

play25:09

and then for the small municipality it

play25:10

was just it was just the

play25:12

one yeah I mean any size customer no

play25:15

matter what I mean obviously it would be

play25:16

great to capture the entire checkpoint

play25:18

footprint so we get a good handle on

play25:20

everything but like we said we can break

play25:22

it up in sections too if that's what you

play25:24

prefer for big customers um that have

play25:27

you know hundreds of 100 if if we don't

play25:29

want to look at every single one um a

play25:32

lot of times we'll take a sample size

play25:34

you know so if it's a multi-domain we'll

play25:35

take one of those domains um and and

play25:38

kind of focus on that to to make sure we

play25:40

don't get too much

play25:43

sprawl I think that covers it please you

play25:45

have any questions type them in quickly

play25:47

I'll go through our end here um thank

play25:50

you again AJ great

play25:52

information we'll send that follow-up

play25:54

email with any reference content and

play25:56

recording link of this session

play25:58

our next webinar will be in two weeks

play26:00

you'll see the invitation for that soon

play26:03

with that we'll let you go thanks again

play26:05

for joining us we'll see you here next

play26:06

time thank you AJ and everyone else

play26:09

enjoy your day talk to you later bye all

play26:13

thank you

Rate This

5.0 / 5 (0 votes)

Related Tags
TalleresMejores PrácticasSeguridadCheckpointEficienciaTaller de SeguridadTaller de PrácticasGestión de RedOptimizaciónWebinarArquitectura de Soluciones
Do you need a summary in English?