©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
Security for Today’s Threat Landscape Kat Pelak 1.
“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Security Observations & Ideas from the field
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
It’s Not Your Father’s NAC: Next-generation NAC
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals Preventing the next breach or discovering the one.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Fortinet An Introduction
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
©2015 Check Point Software Technologies Ltd. 1 Rich Comber SME, Threat Prevention Check Point Software Technologies Moving to a Prevent Based Security.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
The Changing World of Endpoint Protection
Network security Product Group 2 McAfee Network Security Platform.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Winning with Check point
Synchronized Security Revolutionizing Advanced Threat Protection
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
The conversation just gets better CIO to CEO The power of collaboration Luis Alvarez BT Global Services.
© 2006, iPolicy Networks, Inc. All rights reserved. Security Technology Correlation Proneet Biswas Sr. Security Architect iPolicy Networks
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Mail2Cloud Case Study Crescent Electric Supply Company mxHero Solves for Large s & Drives Cloud Adoption 1 Copyright 2016, mxHero Inc.March 8, 2016.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Riverbed Confidential. Riverbed – RVBD 22,000+ Customers $1 BILLION Revenue Market Leader * Performance Management * WAN Optimization * Cloud Storage.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Palo Alto Networks - Next Generation Security Platform
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Understanding and breaking the cyber kill chain
ABC Company Positioned as a Magic Quadrant Leader
Transform IT with networking innovation Dell Networking
Predrag Spasic | Sales Manager Serbia and Macedonia
Deployment Planning Services
Tom Hartig Check Point Software Technologies August 13th, 2015
Hank Johnson, Area Manager Check Point Software Technologies
Virtualization & Security real solutions
Improving Azure IoT Insights with network context
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Check Point Connectra NGX R60
Partners with Dynamics practices are showing an upward trend in both services (+17%) and software (+29%) revenues, compared with partners who.
Secure once, run anywhere Simplify your security with Sophos
Chapter 4: Protecting the Organization
NetApp © 2018 NetApp, Inc. All rights reserved NETAPP CONFIDENTIAL ---
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Microsoft Data Insights Summit
Hosted Security.
Presentation transcript:

©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014 Check Point Software Technologies Ltd Security Engineer, UK Sunny Gill Check Point Corporate Overview

©2014 Check Point Software Technologies Ltd. 2 [Restricted] ONLY for designated groups and individuals The Future Can Be Amazing… When You Are Secure ©2014 Check Point Software Technologies Ltd. 2

©2014 Check Point Software Technologies Ltd. 3 [Restricted] ONLY for designated groups and individuals Accelerating Rise of Malware The Security Landscape 25 Years Ago: Invention of Firewall 20 Years Ago: Invention of Stateful Inspection 10 Years Ago: URL Filtering, UTM 5 Years Ago: NGFW, Mobile Security Now: Threat Intelligence Threat Prevention 15 Years Ago: Prevalent use of Antivirus, VPN, IPS 2010: DDoS attacks: Stuxnet SCADA 1988: Morris Worm 1994: Green Card Lottery 2000: I Love You 2003: Anonymous Formed 2012: Flame Malware 2017: Driverless Cars Hacked? 2006: WikiLeaks 2013: Dragonfly 2011: Stolen authentication information 2014: Bitcoin 2020: IoT Everywhere 1998: Melissa 2007: Zeus Trojan

©2014 Check Point Software Technologies Ltd. 4 [Restricted] ONLY for designated groups and individuals Nations Corporate Networks Hacker GroupsIndividual Individual End User ATTACKER IoT and Strategic Infrastructure Billions Millions Thousands Threats are Growing

©2014 Check Point Software Technologies Ltd. 5 [Restricted] ONLY for designated groups and individuals Evolving and Complex Attacks: A Real Example SOCIAL ENGINEERING TARGETED DELI SITE COMPANY COMPUTERS INFECTED

©2014 Check Point Software Technologies Ltd. 6 [Restricted] ONLY for designated groups and individuals Check Point Security Next Generation Network Security Next Generation Threat Prevention Mobile Security Virtualized / Cloud Security

©2014 Check Point Software Technologies Ltd. 7 [Restricted] ONLY for designated groups and individuals Check Point Security Built on a comprehensive Software-defined Protection (SDP) Architecture ENFORCEMENT LAYER Inspects traffic and enforces protection in well-defined segments CONTROL LAYER Delivers real-time protections to the enforcement points MANAGEMENT LAYER Integrates security with business process

©2014 Check Point Software Technologies Ltd. 8 [Restricted] ONLY for designated groups and individuals Unified Management Best ROI for Management Customized Visibility Unified Policy Everywhere Monitoring

©2014 Check Point Software Technologies Ltd. 9 What about visibility? Using different IP addresses Using different protocols Using different URLs Using different applications 200,000 SECURITY LOGS

©2014 Check Point Software Technologies Ltd. 10 Business Terminology … TURN DATA INTO SECURITY INFORMATION SIMPLE, MEANINGFUL INSIGHTS TURN DATA INTO SECURITY INFORMATION SIMPLE, MEANINGFUL INSIGHTS [Confidential] For designated groups and individuals

©2014 Check Point Software Technologies Ltd º Visibility into Application Usage Events [Confidential] For designated groups and individuals

©2014 Check Point Software Technologies Ltd What’s Hogging The Bandwidth? Facebook – 469MB [Confidential] For designated groups and individuals

©2014 Check Point Software Technologies Ltd. 13 [Restricted] ONLY for designated groups and individuals 360 o Visibility of Network Security [Confidential] For designated groups and individuals Time shows topline security events Map shows origin of attacks and threats Rate and frequency of potential attacks Important security events highlighted

©2014 Check Point Software Technologies Ltd. 14 [Restricted] ONLY for designated groups and individuals

©2014 Check Point Software Technologies Ltd. 15 [Restricted] ONLY for designated groups and individuals

©2014 Check Point Software Technologies Ltd. 16 NEXT GENERATION Smart Event Check Point Introduces… Effective and Customized Visibility Everywhere Monitoring for all Security Threats Big Data Threat Detection in Seconds

©2014 Check Point Software Technologies Ltd. 17 C-Level Executives Hosts by Malicious Activity Monthly Security Trends Employees’ Online Behavior Security Administrators Customized Visibility Tailored for Your Diverse Needs Department Managers

©2014 Check Point Software Technologies Ltd. 18 Access Denied X X X X Remote Access Correlations Identify Suspicious Activities Multiple Locations SAME Credentials Timeline View 1

©2014 Check Point Software Technologies Ltd. 19 [Restricted] ONLY for designated groups and individuals Market Leadership #1 in FW/UTM Appliance Market Share* A Leader in the Gartner Magic Quadrants**: Enterprise Network Firewalls Unified Threat Management Mobile Data Protection Highest IPS Score * Check Point leads in worldwide combined firewall and UTM appliance revenue for full-year 2013 and 1H 2014, according to IDC’s Worldwide Security Appliance Tracker **Gartner, Inc., Magic Quadrant for Enterprise Network Firewalls, Greg Young, Adam Hils, Jeremy D'Hoinne, 15 April 2014; Gartner, Inc., Magic Quadrant for Unified Threat Management, Jeremy D’Hoinne, Adam Hils, Greg Young, 07 August 2014; Gartner, Inc., Magic Quadrant for Mobile Data Protection, John Girard, 08 September Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

©2014 Check Point Software Technologies Ltd. 20 [Restricted] ONLY for designated groups and individuals Our Culture, Employees and Go-to-Market is our Strength More than 100,000 Customers 200 Technology Partners 88+ Countries 6,000+ Channel Partners 3,000 Employees Check Point has long-term relationships with customers and partners

©2014 Check Point Software Technologies Ltd. 21 [Restricted] ONLY for designated groups and individuals Helping Secure You ThreatCloud Emulation Service Security Policy Compliance Performance Sizing Utility Security Checkup Cloud Service

©2014 Check Point Software Technologies Ltd. 22 [Restricted] ONLY for designated groups and individuals Product Highlights

©2014 Check Point Software Technologies Ltd. 23 [Restricted] ONLY for designated groups and individuals Check Point Development Timeline Firewall Stateful Packet Inspection VPN VE UTM Software Blades IPS ID Awareness App Control DLP & MAB Gaia Next Gen Appliances Anti-Bot URLf HTTPSi Threat Emulation Compliance Capsule Next Gen Smart Event Next Gen Management* vSEC SandBlast MTP More to come… *Subject to change

©2014 Check Point Software Technologies Ltd. 24 [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 24 [Restricted] ONLY for designated groups and individuals Establishes a secure business environment on mobile devices Secures your documents everywhere they go Protects devices from threats everywhere Protect mobile devices from rogue Apps that steals your data SEAMLESS security for everywhere you go

©2015 Check Point Software Technologies Ltd. 25 Sandblast: Threat Emulation & Threat Extraction [Restricted] ONLY for designated groups and individuals Zero malware documents delivered in zero seconds Threat Extraction Threat Emulation Threat Extraction Visibility on attack attempts and inspection of original documents

©2015 Check Point Software Technologies Ltd. 26 Stop undiscovered attacks with Check Point SandBlast INSPECT FILE EMULATE PREVENT SHARE [Restricted] ONLY for designated groups and individuals

©2015 Check Point Software Technologies Ltd. 27 For Every Evasion There’s an Anti-Evasion Malware goes to sleep Sandbox accelerates the clock Malware implements its own clock … Malware looks for a Sandbox Sandbox emulate a CPU to hide itself Malware identifies the CPU emulator … Malware looks for a human Sandbox imitates human behavior Malware detects a “virtual human” …

©2015 Check Point Software Technologies Ltd. 28 Detect Where There is No Place to Hide Vulnerability Exploit Malware Shellcode Identify the Exploit Before the attacker had a chance to use evasion techniques Only a handful of exploit methods to keep up with

©2015 Check Point Software Technologies Ltd. 29 CPU-Level Sandbox Technology EXPLOIT Look for the EXPLOIT Monitor the OS and look for abnormal activity Monitor the CPU instructions flow and look for exploit patterns

©2015 Check Point Software Technologies Ltd. 30 The Challenge [Protected] Non-confidential content embedded objects & macros Attackers use embedded objects & macros to inject malware to organization

©2015 Check Point Software Technologies Ltd. 31 Risk-Based Profile Reconstruction Options [Restricted] ONLY for designated groups and individuals Convert to PDF Keep original format Remove content that can be exploited

©2015 Check Point Software Technologies Ltd. 32 What elements can be controlled? [Restricted] ONLY for designated groups and individuals

©2015 Check Point Software Technologies Ltd. 33 How Threat Extraction Works: Inspected by Gateway Attachment Potential malicious content is dropped clean Attachment passed to the end-user Educate user & allow access to original file (if required…) [Protected] Non-confidential content

©2015 Check Point Software Technologies Ltd. 34 Zero Malware Documents THREAT EXTRACTION CHECK POINT THREAT EXTRACTION Original Document Document Reconstructed Zero Malware Document

©2014 Check Point Software Technologies Ltd. 35 a document to: Try it Yourself! THREAT EMULATION & THREAT EXTRACTION Try it Yourself! Upload a file to: threatemulation.checkpoint.com

©2014 Check Point Software Technologies Ltd. 36 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014 Check Point Software Technologies Ltd Thank You