Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Comparison between checkpoint VPN-Gateway and Microsoft ISA

Posted on 2002-05-28
7
2,072 Views
Last Modified: 2013-11-16
What's the comparison between checkpoint VPN-Gateway and Microsoft ISA.
Can I get documentation for the comparison of the two product?
0
Comment
Question by:Mariecel_LSI
  • 3
  • 2
  • 2
7 Comments
 
LVL 23

Accepted Solution

by:
Tim Holman earned 50 total points
ID: 7042342
0
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 7042370
Regardless of feature comparison, do you really want a firewall that's deeply integrated into Windows?  Regardless of how good the ISA code itself is, you can't possibly tell me this is a good idea from a security standpoint.

Not that CheckPoint has a spotless record either, but it's generally pretty solid.
0
 

Author Comment

by:Mariecel_LSI
ID: 7043493
You've given me great  nswers that will support on my documentation.You've given me what i've wanted.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 

Author Comment

by:Mariecel_LSI
ID: 7043510
Chris,
    Can you expound your answer pls? It's the best but I need to document this comparison of the two product.Thank you.
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 7044042
If you take the time to harden Windows properly, then it is pretty secure.
There were vulnerabilities en masse to do with IIS and IE, but if you disable these, then you're relatively safe.
However, the architecture of Windows is designed around an application based operating system.  There's a lot of junk in there that will slow it down.
Unfortunately, Microsoft never gained the trust of the security community - they always have been and always will be the #1 hack / crack target by the anarchists and anti-captialists.  Such an extensive probe of any operating system will eventually find vulnerabilities, and if it is closed, rather than open like Linux, then they are just waiting to be discovered, rather than known about and patched.
Plus with Windows you've got all the moving bits - fans, hard disks, keyboards, mice, cables, which are prone to failure and generally take systems down.
A solid state firewall (eg Cisco PIX, Netscreen) is far more reliable, and faster.  The only moving bit is a fan, and usually these are installed redundantly.
This also applies to Check Point - it is based on an I386 / hard disk architectures, although if you run it on Linux it's very fast, as it was designed around UNIX in the first place...
0
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 7044819
It wasn't so much those things I was thinking about, but more that the ISA code shares a lot of the IIS and IE code for web handling (known true based on past vulnerability disclosures).  So, if IIS and IE can't be trusted, then neither can ISA.
0
 

Author Comment

by:Mariecel_LSI
ID: 7046304
Thank you Chris Calabares and Tim Holman for all teh answers.I think thats enough for my client to go on Checkpoint rather that Microsoft ISA.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question