©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott Ferguson Regional Director ANZ Check Point Software Technologies
©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 2 A Changing World Internet reliance Security threats Worst Year On Record 2004
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 2004’s Top Security Concerns Security: Still A Challenge! New Constituents; Web Services; Partner Web Access; WLAN; Remote Employees New, Dynamic & Blended Security Threats IT Budgets need to stay productivity focused Security Breach: Network Downtime, Lost Revenue, Regulatory Commitments, Damage to Corporate Reputation Dedicated Security Resources are Limited
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Why is Security such a Big Challenge? In a connected world everyone is a target Attacks spread quickly Multitude of distributed systems to protect (and connect) Multiple disparate technologies to implement and manage Web Server Exponential Management Complexity
©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 5 Industry Trends - Enterprises Resource Limitations 5-5.5% of IT budget designated for security Average of 1 full-time security employee/1,000 users Top Security Concerns: Protection of company/ private information Protection against financial losses Need for customer and supplier confidence Concerns around internal network/system security Use of Web services Shareholder confidence Increased Risk 84% suffer operational or financial losses Application level attacks highest consequences Current security system shortcomings –Depth of protection –Management complexity Sources: Information Security, Does Size Matter survey, Sept 2002 Information Security, META Group, August 2003 Vanson Bourne, The Global IT Security Report, 2003
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Australia’s Position Relaxed culture, plague of set and forget strategies that are not sufficient Point products permeate Complexity = complacency Behind the 8-ball (especially the mid-tier) Lag behind US, Europe, Asia Pac and NZ in management involvement Opportunity For Change!
©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 7 Risks to Your Infrastructure Internal Security Web Security (Web protection and access control) Perimeter Security Worms/viruses LAN exposure Access abuse Unpatched systems Expanding perimeter Sophisticated attacks Application-level attacks Increased Web dependence Secure access Web server exposure
©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 8 Options in Today’s Market Internal Security Web Security Perimeter Security App Specific Personal FW HIDS NIDS SSL VPNs SSO Portal Web FW VPN Authentication App Firewall NW Firewall Multiple Technologies, Inconsistent and Disparate Management Systems
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Stateful Inspection/ FireWall OPSEC 1997 VPN Next Generation 2001 SmartDefense 2002 Application Intelligence EAL 4 EAL 4+ Check Point: security is our focus A History of Innovation
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture – What does it mean? 1. The art or science of building (Webster) 2. The way in which anything is physically constructed or designed (Cambridge) 3. (Computing) The general specification and configuration of the internal design of computer or LAN (Allwords.com) 4. (Vendors) Anything with our brand
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture Not Devices People Culture + Behaviour + Education Process Policy Publication + Review Technology Deployment of multiple technologies + Integrate + Single Management + Scale (from the mobile phone PDA and Laptop)
©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 12 Architecture Not Devices SMART management Worry-free protection Intelligent Security Solutions Perimeter In-depth inspection Internal Web
©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 13 Architecture Not Devices Interoperability Trend Micro SurfControl Sun Micro Citrix Tivoli Nortel Nokia +171 Other product sets Integrated Management & Reporting CP Multiple, Market Leading Technologies OPSEC
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Managing Security with Intelligence Enforce SecurityDefine Policy Monitor & Report Analyze & Change Intelligent Security Lifecycle
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Security Management Life Cycle Security Management Life Cycle Define Policy Easy-to-use Graphical interface Graphical policy visualization Monitor & Report Real-time monitoring Instant status of all security elements Automatic reports Analyze & Change Detailed logging Enforce Security Stateful Inspection Application Intelligence SMART Management Your Goal: Lowest Total Cost of Ownership Lowest Total Cost of Ownership - Automated administrative tasks save time and money - Centralised information database minimises capital expenditures
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture Not Devices Protect investments Enhance client relationships through IT enablement Allow you to focus on your business, not on IT Increase productivity SMART management Worry-free protection Intelligent Security Solutions Perimeter In-depth inspection Internal Web
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Forward: Deeper, Broader, Smarter Security Broader deployments gateways, switches, clients, servers desktop, handheld Smarter security management, integrated management tools, event analysis and correlation Deeper content analysis, multi-layer analysis, application specific
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Summary Intelligently Managed Security Process Perimeter, Internal and Web Security –Broader, Deeper, Smarter Internet relianceSecurity threats Security Technology Evolution Intelligent Security Solutions FireWall-1 VPN
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture Not Devices Visit the Check Point Stand and register for a free evaluation kit