R80 security management The Future of Security Management.

Slides:



Advertisements
Similar presentations
System Center 2012 R2 Overview
Advertisements

Which server is right for you? Get in Contact with us
Unified Logs and Reporting for Hybrid Centralized Management
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Dell Connected Security Solutions Simplify & unify.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Network security Product Group 2 McAfee Network Security Platform.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Introduction to Avaya’s SDN Architecture February 2015.
The Derivitec Risk Portal Provides Powerful, Cost-Effective Risk Management Solutions, Powered by Azure, that Deploy in Minutes MICROSOFT AZURE ISV PROFILE:
SDN & NFV Driving Additional Value into Managed Services.
Check Point vSEC STORY [Protected] Non-confidential content.
If it’s not automated, it’s broken!
WHY VIDEO SURVELLIANCE
AuraPortal Cloud Helps Empower Organizations to Organize and Control Their Business Processes via Applications on the Microsoft Azure Cloud Platform MICROSOFT.
Hybrid Management and Security
Cisco Defense Orchestrator
MICROSOFT AZURE ISV PROFILE: BMC SOFTWARE
TOPdesk Service Management Software on Azure
Office 365 is cloud-based productivity, hosted by Microsoft.
Performance Management
Meemim's Microsoft Azure-Hosted Knowledge Management Platform Simplifies the Sharing of Information with Colleagues, Clients or the Public MICROSOFT AZURE.
CIM Modeling for E&U - (Short Version)
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Ralleo Enterprise-Grade Solution for Managing Change and Business Transformation Provides Opportunities to Better Analyze Real-Time Data MICROSOFT AZURE.
Vidcoding Introduces Scalable Video and TV Encoding in the Cloud at an Affordable Price by Utilizing the Processing Power of Azure Batch MICROSOFT AZURE.
New Heights by Guiding Them into the Cloud
Boomerang Adds Smart Calendar Assistant and Reminders to Office 365 That Increase Productivity and Simplify Meeting Scheduling OFFICE 365 APP BUILDER.
Free Cloud Management Portal for Microsoft Azure Empowers Enterprise Users to Govern Their Cloud Spending and Optimize Cloud Usage and Planning MICROSOFT.
Trial.iO Makes it Easy to Provision Software Trials, Demos and Training Environments in the Azure Cloud in One Click, Without Any IT Involvement MICROSOFT.
Microsoft SharePoint Server 2016
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
Hosted on Azure, LoginRadius’ Customer Identity
Speaker’s Name, SAP Month 00, 2017
Makes Navigating Plants Safer, More Efficient
Transforming IT Management
Replace with Application Image
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
Resco Mobile CRM Enables Sales Reps and Field Technicians to Access CRM Data Effortlessly While On the Go Across All Types of Mobile Devices WINDOWS APP.
Be Better: Achieve Customer Service Excellence and Create a Lean RMA and Returns Process with Renewity RMA and the Power of Microsoft Azure MICROSOFT AZURE.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Network Optimizer Optimize Your Business & Cloud Networks
On-Premises, or Deployed in a Hybrid Environment
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
PowerHub on Microsoft Azure Enables Renewable Energy Professionals to Track and Manage Projects from a Centralized Platform Accessible Anywhere MICROSOFT.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
The Only Digital Asset Management System on Microsoft Azure, MediaValet Is Uniquely Equipped to Meet Any Company’s Needs MICROSOFT AZURE ISV PROFILE: MEDIAVALET.
Meeting Rooms Management Empowers Organizations and Their Employees to Become Mobile, and to Save Meeting Space and Time MICROSOFT AZURE APP BUILDER PROFILE:
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
MyCloudIT Enables Partners to Drive Their Cloud Profitability Using CSP-Enabled Desktop Hosting Automation with Microsoft Azure and Office 365 MICROSOFT.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Instantaneous Messaging System Uses Microsoft Azure Platform to Help Physicians Give Optimal Quality Patient Care with Real-Time Information MICROSOFT.
Keep Your Digital Media Assets Safe and Save Time by Choosing ImageVault to be Your Digital Asset Management Solution, Hosted in Microsoft Azure Partner.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Secure once, run anywhere Simplify your security with Sophos
Abiquo’s Hybrid Cloud Management Solution Helps Enterprises Maximise the Full Potential of the Microsoft Azure Platform MICROSOFT AZURE ISV PROFILE: ABIQUO.
AIMS for BizTalk, Built on the Microsoft Azure Platform, Empowers Enterprises to Automate Insight and Analytics and Boost Value Creation MICROSOFT AZURE.
Microsoft Virtual Academy
NSX Data Center for Security
Reportin Integrates with Microsoft Office 365 to Provide an End-to-End Platform for Financial Teams That Simplifies Report Creation and Management OFFICE.
WHY VIDEO SURVELLIANCE
Service management system at cloud
ServiceDesk 7 Preview.
Enhanced agent workspace for messaging
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

R80 security management The Future of Security Management

Managing Security Today is COMPLEX PEOPLE Fewer resources More tickets Greater expertise PROCESS Manual processes Multiple security solutions Lack of integration TECHNOLOGY Mobile Cloud On-Demand Services So why are we here today to talk about security management? Why should you care? Because today managing security is becoming increasingly complex. Your typical CISO has to deal with people, processes and technology. There’s less people to go around & more work. Depending on what research report you read, there’s currently a shortage of between 1 million to 1.5 millionb IT security professionals today worldwide. Also the traditional approach to buying “best of breeds” can be somewhat paradoxical as you end up with multiple interfaces to manage and data silos as well. Managing security is still mostly a manual processes and the lack of integration with other management or workflow systems within the organization adds to the inefficiency of managing security. In the past, security was about protecting networks and servers, nowadays applications, documents, electronic data, public and private cloud, users and mobile devices all must be protected, managed and monitored. Failure to protect any of these assets can create a backdoor for hackers to access the organization. And with the extreme agility of cloud environments where applications are constantly being provisioned in and out and services offered on-demand, security that still mandates human checks simply cannot keep up.  ​

The key to managing complexity is security consolidation We believe the key to managing this complexity is consolidation – bringing all your security protections and functions under one umbrella.

SECURITY MANAGEMENT INTRODUCING… The R80 security management platform, a result of numerous conversations with our customers and many years of R&D, is the culmination of that vision. SECURITY MANAGEMENT  ​

THE PLATFORM TO CONSOLIDATE ALL YOUR SECURITY With unified policy management – you can create policies harmoniously and efficiently. We’ve taken a long hard look at how daily tasks are performed and consolidated and streamlined features to make it as efficient as possible for the security admin to do his work. With R80’s automation capabilities, we are paving the way for automated security provisioning and controls. And when it comes to security visibility - we’ve fully integrated threat management into the main console so security teams can pivot quickly from policy to incidence response and have a holistic view of their security posture in one single place. ckly from policy to incidence response and have a holistic view of their security posture in one single place. Unified Policy Management Efficient, Automated Operations Integrated Threat Management  ​

UNIFIED POLICY MANAGEMENT CHANGE THE WAY YOU MANAGE SECURITY UNIFIED POLICY MANAGEMENT  ​

One Console to Manage Everything Enterprise Now with one console, security teams can now manage all aspects of security from policy to threat prevention – across their entire organization – both their physical and virtual environments. You get operational efficiency, you simplify management and avoid overlapping policies and redundant configurations. Less maintenance costs and labor man hours equals lower TCO. ONE CONSOLE ONE POLICY  ​

One Policy to Manage Everything Users Applications Gateways Data Private Cloud Devices Public Cloud Virtual GW In addition to a unified console, you also now have a unified policy to manage everything from users to data to gateways. All access points are now controlled in one place. The same goes for threat prevention policies. We are unique in offering this level of unification, while still providing tremendous control to the security team.  ​

Unparalleled Policy Granularity & Control Control all traffic from the production network to the Internet Allow developers upload and download JAVA source code to Dropbox and Box Defining a single rule where users, applications and data are defined gives unparalleled control over policy creation. For example, creating this single rule would have taken 30% longer and 80% more mouse clicks using other security vendor management solutions. 1:45 min versus 3:45 min 37 mouse clicks versus 69 mouse clicks. Let’s say each rule takes 1:45 min, and you save 2 mins per rules – that’s 200 minutes – 3 hours. Allow developers to upload and download JAVA source code to Dropbox and Box  ​

Easily Segment Policy for Better Manageability and Control Ann Duties separated based on IT role Walter You can also take this unified policy and segment it into manageable chunks – so you can delegate tasks to the most qualified individuals. For example, Ann can be in charge of application control and Walter web security. You can not only distribute work to a person, you can also automate tasks by segment. Each policy segment can be delegated to distribute workload  ​

EFFICIENT AND AUTOMATED OPERATIONS CHANGE THE WAY YOU WORK AND COLLABORATE EFFICIENT AND AUTOMATED OPERATIONS  ​

Task-Oriented Features Increase Efficiency Reduces Operations from Minutes to Seconds These include best practices features built into the interface that anticipate the daily needs of a security admin. For example, we’ve integrated logs into the policy dashboard….so with a single click, you access the logs associated with the rule. So we did a time-motion study of the how fast it would take to filter logs by a rule and troubleshoot that rule. Find all logs related to a rule which drops traffic Search for an IP address in a drop log Create a host from the dropped source IP to the policy Add the host to a policy rule which allows the host’s traffic For Check Point, it took 1 click versus 2+ clicks for other security vendor management solutions. It took 15 secs for CP and 4:30 min for another NGFW vendor. Again considering a small rule set of 100 rules – you save on average 4 mins per rule to troubleshoot logs. That’s 400 mins or 6 hours! With one click, access all associated logs and rule details  ​

Admin Concurrency Increases Team Productivity Ann Ann logs in, sees rule 3 locked Ann works on rule 2 When you have more than 1 administrator, you can’t have someone locking the entire policy up while he or she is making changes. Not exactly productive. With R80, you can now concurrently work on the same policy without over-riding each other’s changes. Explain the flow… Walter Walter logs in, works on rule 3 Multiple admins can work on same policy without conflict  ​

Align security to your IT processes & systems Cloud Orchestration Provisioning SDN Network Management Ticketing SECURITY MANAGEMENT Security solutions today are often not fully integrated within change management processes – and this can lead to outage and unnecessary complexity. In an environment where you have network management systems, ticketing systems, provisioning and cloud orchestration platforms, you want to be able to embed security into your existing IT processes. The more you can automate security and the workflow, the more you achieve operational efficiency. With R80 APIs, you can now seamlessly integrate security into virtualized networking platforms such as VMware NSX so you can automatically secure virtual applications. You have the ability to also automatically quarantine infected virtual machines/apps. And for your integrations with other systems, you can restrict what an automated task can access and change – based on the segmented policy. Other solutions have APIs as well but they lack the granular control that R80 offers and that control is what gives you the confidence to automate and streamline the entire security workflow. Align security to your IT processes & systems  ​

Align security to your IT processes & systems Cloud Orchestration Provisioning SDN Network Management Ticketing SECURITY MANAGEMENT Other real use cases: Another real life use case from another PoC where a customer who outsourced management of IPS/TP to a MSSP, they wanted to provide API with trusted access only to Policy Exception,  protections, updates and install Policy of Threat Prevention, so the MSSP could use the API to integrate to their existing portal to manage only these components for the customer. Align security to your IT processes & systems  ​

Empower Self-Service Security Add user Helpdesk Portal All Categories Add application Add host Block user Block application Block host settings Apps Use R80 API to automate routine Helpdesk security tasks So here’s a mockup of what it might look like – the security team can create a web services portal that allows HelpDesk admins to add users, applications or hosts independently.  ​

Empower Self-Service Security Helpdesk Portal All Categories settings Apps Add application John Smith Social networking Facebook OK Cancel User name App category App name Add user Helpdesk Portal All Categories Add application Add host Block user Block application Block host settings Apps Improve Helpdesk SLA Reduce Security team workload overhead Since the HelpDesk no longer has to wait on Security, it tremendously improves SLA for tickets. Here’s the scenario: They have 5 administrators 3000 tickets per year 20-30 min per ticket As they are moving to cloud and virtual data centers they are always looking to improve processes Also they don’t want the admins to handle simple tickets (for example add printer) They started the project with developing web portal that allows them to offload tickets to the helpdesk The web portal (illustration in our ppt) is a help desk tool that connects with API to R80 In the future the will also cut the middle man (the help desk) and connect the ticketing system directly to R80 (so they will not need the new web portal) Another SaaS customer also plan to use APIs to help them track white-list updates and changes in SP addresses so customers can do work. Tee up a web services portal for their branch office to pull up white-list to troubleshoot issues. Another real life use case from another PoC where a customer who outsourced management of IPS/TP to a MSSP, they wanted to provide API with trusted access only to Policy Exception,  protections, updates and install Policy of Threat Prevention, so the MSSP could use the API to integrate to their existing portal to manage only these components for the customer. By empowering the business owners to serve themselves, security becomes an enabler of business innovation. Also we are ensuring that security doesn’t lose a step (keeps one step ahead as it were) of the cloud business model needs.  [Restricted] ONLY for designated groups and individuals​  ​

INTEGRATED THREAT MANAGEMENT CHANGE THE WAY YOU MANAGE RISK INTEGRATED THREAT MANAGEMENT  ​

Fully Integrated Threat Management Logging Monitoring SECURITY MANAGEMENT Event Correlation Reporting We’ve integrated logging, monitoring, event correlation and reporting into the main console – for full visibility and faster incidence response – because when an incident happens, you need immediate visibility into who, what, when, where and how of the attack. With our integrated threat management, besides a unified threat prevention policy that now unifies IPS, anti-bot, anti-spam, DLP… Logging – isolate and detect real threats in real-time. Using google like search – admin can find all the log information he needs. He can search on any field – by software blade, user, IP, application, threat, security gateway, time span etc. and see all results in a single view. Event correlation – we provide the only native event correlation for all our enforcement points. So you can weed out the critical events and be able to quickly drill down to investigate Monitoring – integrated monitoring means you get detailed information on your gateways via a single view. You can collect real-time or historical data on each security gateway health status, system resources, performance counters and VPN tunnel status. The data can be used to troubleshoot security policy and gw configurations. For Full Visibility Across Your Network  ​

A Single View into Security Risk  ​

Investigate the Threat  ​

Respond to security incidents immediately and prevent the next attack From View to Action Respond to security incidents immediately and prevent the next attack  ​

Easily Customizable, Monitor What’s Important Not only do we make it easy and efficient to drill down to investigate and mitigate events, we also make it very easy to customize the information relevant to each customer’s environment.  ​

Easily Customize Your Reports Accessible from any device It is possible to create custom reports for each stakeholder so if you CISO wants to look at what applications users are accessing most this week, you can easily tee up the report and even make it accessible via a web browser. Management Helpdesk Auditor  ​

Keep Your Security Compliant Compliance Overview Helps you optimize your security settings & compliance 95% of security breaches could have been prevented by the correct configuration of security products Gartner As we mentioned configuration errors are a major cause of security exposure. As part of our TM interface, you can also view policy compliance – see what rules need to be tuned based on best practices or mapped to key industry regs for those customers are interested in compliance reporting.  ​

What Our Customers Are Saying “R80 is great, everything is in one place so it’s easy to get a full picture of your enterprise security.” “I really liked it, don’t know if I could go back to the previous version.” “With R80,you have given us features we didn’t know we needed.”  ​

Consolidate all your security THE FUTURE OF SECURITY MANAGEMENT Consolidate all your security Keep pace with dynamic environments Deploy security without impeding innovation Gain full visibility to prevent the next attack  ​

Ask questions. Share code. Stay up-to-date. COMMUNITY. CHECKPOINT.COM Ask questions. Share code. Stay up-to-date. Customers Partners Experts  ​

Thank you