{"product_id":10375,"v_id":10375,"product_name":"Check Point VSX R67 with Provider-1 R71","certification_status":"Not Certified","certification_date":"2012-06-11T00:06:00Z","tech_type":"Enterprise Security Management, Firewall, Virtual Private Network, Wireless Monitoring","vendor_id":{"name":"Check Point Software Technologies Ltd.","website":"https://www.checkpoint.com"},"vendor_poc":"David Ambrose, Malcolm Levy","vendor_phone":"703-628-2935; +972 37534561","vendor_email":"product_certifications@checkpoint.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>The TOE is one or more gateway devices managed by a Provider-1 management server, using management GUI interfaces. The product provides controlled connectivity between two or more network environments. It mediates information flows between clients and servers located on internal and external networks governed by the firewalls.</p>\r\n<p>The claimed security functionality described in the Security Target is a subset of the product's full functionality. The evaluated configuration is a subset of the possible configurations of the product, established according to the evaluated configuration guidance.&nbsp;&nbsp;</p>\r\n<p>The security functionality within the scope of the evaluation included traffic filtering, &nbsp;where virtual systems run information flow control programs coded in Check Point&rsquo;s patented INSPECT language;&nbsp; intrusion detection and prevention (IDS/IPS) integrated with the traffic-filtering functionality, matching traffic with predefined attack signatures, and providing recording, analysis and reaction capabilities , IKE/IPSec and SSL&nbsp; virtual private networking (VPN) , network address translation (NAT), centralized security management, auditing, and fault tolerance.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that the&nbsp;&nbsp; TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the&nbsp;&nbsp; TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 3. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 3.&nbsp; Science Application International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the TOE is EAL 4 augmented with ALC_FLR.3.&nbsp; The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target.&nbsp; Several validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC.&nbsp; The evaluation was completed in May 2012.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report<em> for </em>Check Point VSX prepared by CCEVS.</p>","environmental_strengths":"<p>Check Point VSX R67.10 in Combination with Provider-1 R71 with R7x hotfix is a virtualization environment for the implementation of network traffic information flow controls, providing controlled connectivity between two or more network environments.&nbsp; The TOE provides security functionality that includes traffic filtering, intrusion detection and prevention (IDS/IPS), IKE/IPSec and SSL virtual private networking (VPN), and network address translation (NAT), as well as security management, audit and Protection of the TSF.&nbsp; Check Point VSX provides a level of protection that is appropriate for IT environment that require that information flows be controlled and restricted among network nodes where the Check Point components can be appropriately protected from physical attacks.</p>","features":[]}