©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)

Slides:



Advertisements
Similar presentations
What’s New in Fireware XTM v11.3.4
Advertisements

| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
McAfee One Time Password
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Random Password Manager Centralized scalable password management security and recovery Joe Vachon Sales Engineer.
Mike Bayne 15 September 2011
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Module 3 Windows Server 2008 Branch Office Scenario.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
Module 16: Software Maintenance Using Windows Server Update Services.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
Clinic Security and Policy Enforcement in Windows Server 2008.
Your storage on the ground; Your files in the cloud.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T Technical Lab n°1 Guidelines End-to-End Security and VPN.
1 FirePass 6.0 Sales Training. 2 Agenda FirePass 6.0 Release Highlights Packaging & Pricing Product Availability Q&A.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.6 build 16.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
StoneGate SSL VPN 1.2 Technical Overview
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
Module 11: Remote Access Fundamentals
Module 8: Configuring Network Access Protection
What’s New in Fireware v11.9.5
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Integrating and Troubleshooting Citrix Access Gateway.
Microsoft Management Seminar Series SMS 2003 Change Management.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
Enterprise Messaging & Collaboration. e-Interact Modules.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
What’s New in Fireware v WatchGuard Training.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Managing Network Access Protection. Introduction to NAP Issues  Although corporate networks are highly secured, no control over the configuration of.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
What’s New in WatchGuard Mobile VPN with IPSec WatchGuard Training.
CudaLaunch for Barracuda NG Firewall.
Barracuda NextGen Firewalls
Modernizing your Remote Access
Securing the Network Perimeter with ISA 2004
Forefront Security ISA
Dumps PDF Check Point Certified Security Administrator – GAiA dumps.html Dumps Checkpoint.
Check Point Connectra NGX R60
Chapter 10: Advanced Cisco Adaptive Security Appliance
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)

2 2©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Remote Access Overview 2 SecureClient vs.VPN R75 3 R75 Feature Set 4 CP Mobile / Mobile Access Blade

3 3©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Remote Access Overview 2 SecureClient vs.VPN R75 3 R75 Feature Set 4 CP Mobile / Mobile Access Blade

4 4©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Remote Access Overview Complete Remote Access Solutions Check Point Mobile SSL VPN Portal On Demand Client (SNX) Check Point Mobile SSL VPN Portal On Demand Client (SNX) Mac iOS, (Windows, Mac OS X, Linux, Android, Symbian)* Supported Clients Client Software Endpoint TEPS R73 Endpoint Security Gateway Platforms Gateway Appliance Windows XP32, Vista 32/64, W7 32/64 Windows Endpoint EPS VPN R75** Endpoint *Roadmap **SR Win7 64 bit version EA planned for late Q4 EndpointABRAEndpointABRA Corporate Owned Personal Owned

5 5©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Remote Access Overview Complete Remote Access Solutions Check Point Mobile SSL VPN Portal On Demand Client (SNX) Check Point Mobile SSL VPN Portal On Demand Client (SNX) Mac iOS, (Windows, Mac OS X, Linux, Android, Symbian)** Supported Clients Client Software Endpoint TEPS R73 Endpoint Security Gateway Platforms Gateway Appliance Windows XP32, Vista 32/64, W7 32/64 Windows Endpoint EPS VPN R75 Endpoint *Roadmap*Roadmap EndpointABRAEndpointABRA Corporate Owned Personal Owned VPN Blade Mobile Access Blade ABRAABRA

6 6©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 Remote Access Overview 2 SecureClient vs.VPN R75 3 R75 Feature Set 4 CP Mobile / Mobile Access Blade

7 7©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Secure Client WorkFlow ► Secure Client ► Secure Access ► EPS VPN R75 Secure Client Security Gateway Security Management VPN Connect Firewall Policy Compliance Single server-side ‘Point of Contact’

8 8©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | R73 Workflow ► Secure Client ► Secure Access ► EPS VPN R75 Security Gateway Secure Access Security Management VPN Connect Firewall Policy Endpoint Security Server Compliance Separate ‘Point of Contact’ for security and VPN

9 9©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | R75 Workflow ► Secure Client ► Secure Access ► EPS VPN R75 “EPS VPN R75” Security Gateway Security Management VPN Connect Firewall Policy Compliance Single server-side ‘Point of Contact’

10 ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Why Upgrade Automatic and transparent upgrades, with no administrator privileges required Supports 32-bit and 64-bit, Windows Vista and Windows 7 Uses less memory resources than SecureClient Automatic disconnect/reconnect as clients move in and out of the network Seamless connection experience while roaming Supports most existing SecureClient features, including Office Mode, Desktop Firewall, Secure (detailed information later) Configuration Verification (SCV), Secure Domain Logon (SDL), and Proxy Detection Does not require a SmartCenter server upgrade Endpoint Security VPN and SecureClient can coexist on client systems during the upgrade period SR/SC will go EOS 06/2011

11 ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Download R75 Upgrade Guide (for Your Management Version) R75 Admin Guide Download Client Packages & GW Hotfix (for Your Gateway Version – ETA R71 GW end of 2010) RTFMs, sk56580 and sk36681 To do‘s Verify Desktop Security Settings Check that your FW Rules will not prevent communication over 443, etc. Change To new Endpoint Blade License Modell – you have to !!! Install GW Hotfix Configure R75 client package Use SC and R75 in parallel Migrate the rest of your old SecureClients Have a beer or two How do I Upgrade

12 ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Migration to Software Blades Functionality upgrade to Software blades is FREE! KEEP the perpetual license and current support rates. ADD any software blades on top Free migration, add new software blades for just $6 a year!

13 ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 Remote Access Overview 2 SecureClient vs.VPN R75 3 R75 Feature Set 4 CP Mobile / Mobile Access Blade

14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R75 Feature Set R75 Features R75 Features ► SC & R75 ► R75 only ► R75Post GA

15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R75 Feature Set R75 Features R75 Features ► SC & R75 ► R75 only ► R75 Post GA ► * VPN connectivity features ► Authentication, Encryption, Topology, Office Mode IP, NAT-T, TCP Port 443 tunneling (Visitor Mode IP), Proxy support ► * Desktop firewall features ► Policy management, Logs upload to gateway, * Compliance validation Using Secure Configuration Verification (SCV) ► * Other features ► SDL (SecureDomain Logon), Pre-package client with preconfigured settings, Localization, SmartView Monitor, SmartView Tracker, Dialup, Connfiguration File Corruption Recovery, Post Connect Script ► * VPN connectivity features ► Authentication, Encryption, Topology, Office Mode IP, NAT-T, TCP Port 443 tunneling (Visitor Mode IP), Proxy support ► * Desktop firewall features ► Policy management, Logs upload to gateway, * Compliance validation Using Secure Configuration Verification (SCV) ► * Other features ► SDL (SecureDomain Logon), Pre-package client with preconfigured settings, Localization, SmartView Monitor, SmartView Tracker, Dialup, Connfiguration File Corruption Recovery, Post Connect Script

16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R75 Feature Set R75 Features ► SC & R75 ► R75 only ► R75 Post GA ► Hot Spot Detection / Registration ► Auto Connectivity Detection ► Auto Cert Renewal in CLI Mode ► Location Awareness ► Roaming ► Auto- / Transparent Upgrade ► 64 bit Vista / W7 Support ► Auto Site Detection ► Geo Clusters ► Machine Idleness ► Flush DNS Cache ► Hot Spot Detection / Registration ► Auto Connectivity Detection ► Auto Cert Renewal in CLI Mode ► Location Awareness ► Roaming ► Auto- / Transparent Upgrade ► 64 bit Vista / W7 Support ► Auto Site Detection ► Geo Clusters ► Machine Idleness ► Flush DNS Cache

17 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R75 Feature Set R75 Features ► Key Point ► R75 Only ► R75 Post GA ► Upcoming HFA’s ► DNS Splitting Support multiple DNS servers, "No Office Mode" Connect Mode, Link Selection, Secondary Connect ► Next Major Release ► Single Sign-on (SSO), Entrust Entelligence Support, Diagnostic Tools, DHCP Automatic Lease Renewal ► No Feature Migration ► "Suggest Connect" Mode, Compression IPSec traffic ► Upcoming HFA’s ► DNS Splitting Support multiple DNS servers, "No Office Mode" Connect Mode, Link Selection, Secondary Connect ► Next Major Release ► Single Sign-on (SSO), Entrust Entelligence Support, Diagnostic Tools, DHCP Automatic Lease Renewal ► No Feature Migration ► "Suggest Connect" Mode, Compression IPSec traffic

18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Remote Access Overview 2 SecureClient vs.VPN R75 3 R75 Feature Set 4 CP Mobile / Mobile Access Blade

19 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Today’s Workforce Mobile platforms – becoming an essential and standard business tool Smartphones and Tablets… …accessing and business web applications

20 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Mobile Access Software Blade Simple and Secure Corporate Access from Mobile Devices Simple and Secure Corporate Access from Mobile Devices Keep your data secured Deployment, unified management and reporting Simply connect to applications and

21 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Simple for the Administrator Enable mobile access blade on your Gateway Set Access Policies for users Generate & send an activation key to the users

22 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point Mobile Client Tap “Check Point Mobile” Enter your password Gain secure access to your data!

23 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Mobile Access Software Blade Pricing Check Point Mobile app - free Mobile Access Blade priced by concurrent connected users: Up to 50 concurrent users $1,500 Up to 200 concurrent users $4,000 Unlimited concurrent users $9,000

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone May I answer your questions?

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Thank You!