This centralized management console is used to define security policies; view graphical representations of an organization's security topology; monitor and report on network and security data; and centrally distribute licenses and software updates to Check Point perimeter, internal and web security gateways.