User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Introduction to Information Security
Chapter 2: Safe@Office Security 31
Chapter 2
This chapter explains the basic security concepts on which Safe@Office security is based.
This chapter includes the following topics:
Introduction to Information Security..........................................................31
The Safe@Office Firewall..........................................................................37
Introduction to Information Security
Network security is but a small part of information security, which in turn is only a fraction
of general security. In order to understand why the Safe@Office appliance is the best
product for securing the business network, we must first examine information security
requirements in general.
Information is Valuable!
The most valuable asset an organization has is its information. The type of information
maintained by an organization depends on the organization's type and purpose. For
example:
• Almost every organization stores information about its operations, such as
employees' names and other personal details, salaries, and so on.
• Depending on the role of different governmental offices, they may store personal
information about citizens, residential addresses, car licenses registration, and so
on.
• The army stores information about its soldiers, weapons inventory, and
intelligence information about other armies. Much of this information is
confidential.
• A bank stores information about its customers' accounts, their money
transactions, ATM machine access codes, and so on. Much of this information is
confidential.
Safe@Office Security