Check Point Software has announced network administration software that for the first time combines Internet protocol (IP) addresses with user identities.
The company announced last week that its new Meta IP User-to-Address Mapping (UAM) software works in conjunction with Check Point's FireWall-1 and Virtual Private Network security software to allow network administrators to match users and security profiles with IP addresses.
The UAM technology available in META IP is the key software that integrates the mapping of IP addresses with individual users, said Walt Conner, Check Point's director of public relations.
Because UAM creates a historical log that identifies users with IP addresses, Check Point can now trace attempted violations of security policy to a specific individual.
Previously, network administrators were forced to either require users to sign on to both the network operating system and the firewall, or to compromise security by setting policies based on IP addresses with no knowledge of which employee was at a given IP address.
"Integrating UAM with FireWall-1 and VPN-1 allows administrators, for the first time ever in a dynamic network environment, to automatically and transparently implement security policies customised to the specific needs of each individual user group of users," said Asheem Chandna, vice president of marketing and business development for Check Point.
In addition, it is no longer necessary to manually have to administer and oversee multiple sign-ons, a significant time saver, according to Grant Asplund, a Check Point spokesman.
The integrated identification system fulfils an as yet unmet need, said Bruce Robertson, vice president of the Meta Group, a US market research firm.
"They are doing the right thing," Robertson said. "It's an important step forward in user group-based policy management.