©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point InterSpect ™ The Internal Security Gateway ™ ISSA April 15 th, 2004.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
C ONFIDENTIAL July COM and LineSider bring OverDrive to Managed Service Providers.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Grow Your Business with the Mitel Applications Suite PSG Networks Mitel Business Partner.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security.
Karolina Muszyńska Based on
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Norman SecureSurf Protect your users when surfing the Internet.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
L OUISIANA T ECH U NIVERSITY MECHANICAL ENGINEERING PROGRAM Computer Science Salesforce Cloud By Parthasarathi Mahadasyam.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Embracing IP Multimedia Services for Strategic Business Advantage Rick Seeto VP & GM Enterprise Networks, Asia Pacific.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
BMC Software confidential. BMC Performance Manager Will Brown.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
Joseph Ferracin Director IT Security Solutions Managing Security.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Powering your CTS Investment with Diagnostics and Resolutions Paul McCloskey.
Citrix Solutions in Financial Services Joseph Alexander Delgado Business Development Manager, Citrix Wordtext Systems, Inc.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Copyright© 2002 Avaya Inc. All rights reserved Anna Dorcey Director, Avaya DeveloperConnection Program August 4, 2004 Partnering in the VOIP World Anna.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Safe’n’Sec IT security solutions for enterprises of any size.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
CONFIDENTIAL AND PROPRIETARY. Overview A Global Cloud-Based Software Company Provider of a Cloud Business Management solutions to the SMB and divisions.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Chapter 7. Identifying Assets and Activities to Be Protected
Juniper Software-Defined Secure Network
AT&T Premises-Based Firewall Enhanced SBS Solution
Trend Micro Control Manager 5.0
Check Point Connectra NGX R60
Microsoft Data Insights Summit
Presentation transcript:

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott Ferguson Regional Director ANZ Check Point Software Technologies

©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 2 A Changing World Internet reliance Security threats Worst Year On Record 2004

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 2004’s Top Security Concerns Security: Still A Challenge! New Constituents; Web Services; Partner Web Access; WLAN; Remote Employees New, Dynamic & Blended Security Threats IT Budgets need to stay productivity focused Security Breach: Network Downtime, Lost Revenue, Regulatory Commitments, Damage to Corporate Reputation Dedicated Security Resources are Limited

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Why is Security such a Big Challenge?  In a connected world everyone is a target  Attacks spread quickly  Multitude of distributed systems to protect (and connect)  Multiple disparate technologies to implement and manage Web Server Exponential Management Complexity

©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 5 Industry Trends - Enterprises Resource Limitations  5-5.5% of IT budget designated for security  Average of 1 full-time security employee/1,000 users Top Security Concerns:  Protection of company/ private information  Protection against financial losses  Need for customer and supplier confidence  Concerns around internal network/system security  Use of Web services  Shareholder confidence Increased Risk  84% suffer operational or financial losses  Application level attacks highest consequences  Current security system shortcomings –Depth of protection –Management complexity Sources: Information Security, Does Size Matter survey, Sept 2002 Information Security, META Group, August 2003 Vanson Bourne, The Global IT Security Report, 2003

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Australia’s Position  Relaxed culture, plague of set and forget strategies that are not sufficient  Point products permeate  Complexity = complacency  Behind the 8-ball (especially the mid-tier)  Lag behind US, Europe, Asia Pac and NZ in management involvement  Opportunity For Change!

©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 7 Risks to Your Infrastructure Internal Security Web Security (Web protection and access control) Perimeter Security  Worms/viruses  LAN exposure  Access abuse  Unpatched systems Expanding perimeter Sophisticated attacks Application-level attacks Increased Web dependence Secure access Web server exposure

©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 8 Options in Today’s Market Internal Security Web Security Perimeter Security App Specific Personal FW HIDS NIDS SSL VPNs SSO Portal Web FW VPN Authentication App Firewall NW Firewall Multiple Technologies, Inconsistent and Disparate Management Systems

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Stateful Inspection/ FireWall OPSEC 1997 VPN Next Generation 2001 SmartDefense 2002 Application Intelligence EAL 4 EAL 4+ Check Point: security is our focus A History of Innovation

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture – What does it mean?  1. The art or science of building (Webster)  2. The way in which anything is physically constructed or designed (Cambridge)  3. (Computing) The general specification and configuration of the internal design of computer or LAN (Allwords.com)  4. (Vendors) Anything with our brand

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture Not Devices People Culture + Behaviour + Education Process Policy Publication + Review Technology Deployment of multiple technologies + Integrate + Single Management + Scale (from the mobile phone PDA and Laptop)

©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 12 Architecture Not Devices SMART management Worry-free protection Intelligent Security Solutions Perimeter In-depth inspection Internal Web

©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 13 Architecture Not Devices Interoperability Trend Micro SurfControl Sun Micro Citrix Tivoli Nortel Nokia +171 Other product sets Integrated Management & Reporting CP Multiple, Market Leading Technologies OPSEC

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Managing Security with Intelligence Enforce SecurityDefine Policy Monitor & Report Analyze & Change Intelligent Security Lifecycle

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Security Management Life Cycle Security Management Life Cycle Define Policy Easy-to-use Graphical interface Graphical policy visualization Monitor & Report Real-time monitoring Instant status of all security elements Automatic reports Analyze & Change Detailed logging Enforce Security Stateful Inspection Application Intelligence SMART Management Your Goal: Lowest Total Cost of Ownership Lowest Total Cost of Ownership - Automated administrative tasks save time and money - Centralised information database minimises capital expenditures

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture Not Devices  Protect investments  Enhance client relationships through IT enablement  Allow you to focus on your business, not on IT  Increase productivity SMART management Worry-free protection Intelligent Security Solutions Perimeter In-depth inspection Internal Web

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Forward: Deeper, Broader, Smarter Security Broader deployments gateways, switches, clients, servers desktop, handheld Smarter security management, integrated management tools, event analysis and correlation Deeper content analysis, multi-layer analysis, application specific

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Summary  Intelligently Managed Security Process  Perimeter, Internal and Web Security –Broader, Deeper, Smarter Internet relianceSecurity threats Security Technology Evolution Intelligent Security Solutions FireWall-1 VPN

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture Not Devices Visit the Check Point Stand and register for a free evaluation kit