{"product_id":10352,"v_id":10352,"product_name":"Check Point VPN-1 NGX","certification_status":"Not Certified","certification_date":"2012-11-01T00:11:00Z","tech_type":"Firewall, Virtual Private Network, Wireless Monitoring","vendor_id":{"name":"Check Point Software Technologies Ltd.","website":"https://www.checkpoint.com"},"vendor_poc":"David Ambrose, Malcolm Levy","vendor_phone":"703-628-2935; +972 37534561","vendor_email":"product_certifications@checkpoint.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>Check Point VPN-1 NGX R65 &nbsp;is a network perimeter security device that provides controlled connectivity between two or more network environments. It mediates information flows between clients and servers located on internal and external networks governed by the firewall.</p>\r\n<p>The product provides a broad set of information flow controls, including traffic filtering, application-level proxies and intrusion detection and prevention capabilities. IPSec and</p>\r\n<p>SSL VPN functionality encrypts and authenticates network traffic to and from selected peers, in order to protect the traffic from disclosure or modification over untrusted networks. Management can be performed either locally or remotely using management interfaces that are included in the Target of Evaluation (TOE).</p>\r\n<p>The claimed security functionality described in the Security Target is a subset of the product's full functionality. The evaluated configuration is a subset of the possible configurations of the product, established according to the evaluated configuration guidance.&nbsp;&nbsp;</p>\r\n<p>The security functionality within the scope of the evaluation included traffic filtering, &nbsp;where information flow control programs coded in Check Point&rsquo;s patented INSPECT language;&nbsp; intrusion detection and prevention (IDS/IPS) integrated with the traffic-filtering functionality, matching traffic with predefined attack signatures, and providing recording, analysis and reaction capabilities , Virtual private networking (VPN) , centralized security management, and auditing.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that the&nbsp;&nbsp; TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the&nbsp;&nbsp; TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.2, Revision 256. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 2.2, Revision 256.&nbsp; Science Application International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the TOE is EAL 4 augmented with AVA_VLA.3 and ALC_FLR.3.&nbsp; The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target.&nbsp; Several validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC.&nbsp; The evaluation was completed in March 2009.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report<em> for </em>Check Point VPN-1 NGX R65 prepared by CCEVS.</p>","environmental_strengths":"<p>Check Point VPN-1 NGX R65 is a network perimeter security device that provides controlled connectivity between two or more network environments.&nbsp; The TOE provides security functionality that includes traffic filtering, intrusion detection and prevention (IDS/IPS), Virtual private networking (VPN), as well as security management, audit and Protection of the TSF.&nbsp; Check Point VPN-1 NGX R65 provides a level of protection that is appropriate for IT environment that require that information flows be controlled and restricted among network nodes where the Check Point components can be appropriately protected from physical attacks.</p>","features":[]}