©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point InterSpect ™ The Internal Security Gateway ™ ISSA April 15 th, 2004.

Slides:



Advertisements
Similar presentations
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Advertisements

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Chapter 12 Network Security.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Unified Logs and Reporting for Hybrid Centralized Management
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Department Of Computer Engineering
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Firewall Slides by John Rouda
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Barracuda Load Balancer Server Availability and Scalability.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Policy and Configuration Compliance for Devices Connecting to the Wireless Network.
Dell Connected Security Solutions Simplify & unify.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Security fundamentals Topic 10 Securing the network perimeter.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
IS3220 Information Technology Infrastructure Security
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Critical Security Controls
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
CONNECTING TO THE INTERNET
Hybrid Management and Security
Securing the Network Perimeter with ISA 2004
Threat Management Gateway
CompTIA Security+ Study Guide (SY0-401)
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Check Point Connectra NGX R60
Presentation transcript:

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point InterSpect ™ The Internal Security Gateway ™ ISSA April 15 th, 2004

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 2 Today’s Challenge  Then: IT resources focused on network perimeter…  Now: Dedicated IT resources focused on internal networks  Many attacks are introduced inside the network –Laptops/PDAs travel in and out of the network daily –Legitimate, authenticated users can be contagious –Effective patching takes time  Worms spread internally, very fast –Blaster –Slammer  No perfect solution –Point-products address some concerns, but not the “big picture”

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 3 Currently Available Technologies Don’t Meet the Need Secure Switches/ Routers Perimeter Firewalls Anti-VirusIDS/IPS Worm Defenses --- Varies by vendor Signature and/or Response Based (Reactive) Network Zone Segmentation Limited ---Basic Quarantine --- AvailableLimited LAN Protocol Protection --- Varies by vendor Only from the host perspective Limited Pre-emptive Attack Protection --- Varies by vendor No, Requires virus definitions Limited Seamless Deployment & Management Security policy difficult to configure and manage Granular policy based on explicitly allowed traffic Requires setup on every device Cumbersome configuration, management burden

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 4 Security Considerations: Internal vs. Perimeter Perimeter SecurityInternal Security Application Environment Standard, well-defined applications Client-to-server applications Stricter adherence to protocols Typically centrally-coordinated security Homegrown applications Client-to-client applications Loose adherence to protocols No central security coordinator Default Access Control Policy Block all traffic unless explicitly allowed Allow all traffic unless explicitly blocked Priority 1.Security 2.Non-disruptive to traffic 1.Non-disruptive to traffic 2.Security LAN Protocols LAN protocols can be blockedLAN protocols must be allowed Internal security introduces unique challenges and requires a dedicated solution

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 5 Check Point InterSpect The Industry’s First Internal Security Gateway  A complete security solution designed for deployment inside of networks Key Features Intelligent Worm Defender™ Network Zone Segmentation Quarantine of Suspicious Computers LAN Protocol Protection Pre-emptive Attack Protection Seamless Network Deployment and Management Interface

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 6 LAN Deployment Locations In front of a single key workgroup Behind WAN Access routers In front of server farm uplinks In front of several workgroups WAN

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 7 Comparing Related Technologies Secure Switches/ Routers Perimeter Firewalls Anti-VirusIDS/IPS Check Point InterSpect Worm Defenses ---Varies by vendor Signature and/or Response Based (Reactive) Network Zone Segmentation Limited ---Basic Quarantine --- AvailableLimited LAN Protocol Protection ---Varies by vendor Only from the host perspective Limited Pre-emptive Attack Protection --- Varies by vendor No, Requires virus definitions Limited Seamless Deployment & Management Security policy difficult to configure and manage Granular policy based on explicitly allowed traffic Requires setup on every device Cumbersome configuration, management burden

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 8 Intelligent Worm Defender™ Check Point InterSpect Key Benefits  Blocks the spread of worms/attacks inside the network  Protects against fast moving (flash or blitz) worms Applies Application Intelligence and Stateful Inspection technologies to internal network security

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 9 Network Zone Segmentation Key Benefits  Prevents unauthorized access between zones  Contains attacks within sub-segment of network Bridge Mode Router Perimeter Firewall Backbone switch Finance QA R&D Floor switch Floor switch Floor switch IP 1 IP 2 Internet InterSpect

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 10 Quarantine of Suspicious Computers Check Point InterSpect Key Benefits  Isolates attacks and compromised devices  Restricts infected computers from contaminating other devices  Protects un-patched computers until patched When user is quarantined, user and admin is notified via dynamic web page Unique to InterSpect

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 11 LAN Protocol Protection  Microsoft RPC  CIFS  MS SQL  DCOM  Sun RPC  DCE RPC  HTTP  And more! Key Benefits  Protects and supports protocols and applications used inside the network  Ensures stability of internal networks Internal networks use more, and different, protocols than perimeter networks Broadest and deepest protocol inspection capability via Application Intelligence: Unique to InterSpect

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 12 Pre-emptive Attack Protection Key Benefits  Proactively and dynamically protects against known and unknown attacks via SmartDefense  Defends against vulnerabilities before they are exploited

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 13 Seamless Network Deployment & Management Interface Key Benefits  Installs in minutes  Easy to use and manage  Won’t block legitimate traffic  Non-disruptive install into existing network infrastructure  Multiple in-line operating modes for flexible deployment Bridge Switch Router  Monitor only capability  GUI tailored for internal network deployment

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 14 Easily Configurable Attack Protection Monitor only options Simple Quarantine set-up

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 15 Exception List for Non-Disruptive Deployment e.g., Bypass exception allows homegrown applications to support non-standard use of protocols

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 16 Performance for Internal Security  High performance is expected in the LAN  InterSpect enhancements for the LAN –100% of inspection is done inside the kernel –InterSpect contains advanced streaming technologies –SecureXL is integrated into InterSpect –All inspection is accelerated

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Models and Pricing

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 18 InterSpect Model Comparison InterSpect 210InterSpect 410InterSpect 610/610F Target One workgroup protection Multiple workgroup protectionGigabit network protection Throughput200Mbps500Mbps1000Mbps List Price$9,000$18,000$36,000 / $39,000 Fiber interfacesN/AAdd-on availableAdd-on available / Included Expansions SlotsN/A11 Inspection Ports23-10 Management Port111 Max ports310 Interface speed10/10010/100/1000 VLAN Support8 VLANs128 VLANsUnlimited Redundant PowerNoOptionalIncluded SmartDefense Subscription Included for 1 st year, then optional renewal All models include: SmartDashboard for InterSpect, SmartView Monitor for InterSpect, and SmartView Reporter for InterSpect

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd.

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 20 About Check Point  The most relied upon and trusted Internet security vendor –Security is all we do – and we do it better than anyone! –Used by 97 of the Fortune 100 –Established market leader in both firewall and VPN 65% market share in enterprise VPN/firewall (IDC) 36% market share in appliances running Check Point (Infonetics)  Customer-driven philosophy –Industry-leading technology partnerships –Strong and diversified channel partnerships –Open business model

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 21 Stateful Inspection/ FireWall OPSEC 1997 VPN Next Generation 2001 SmartDefense 2002 Application Intelligence 2003 Check Point: Always a step ahead of customer’s real-world challenges Check Point: Always a step ahead of customer’s real-world challenges A History of Innovation

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 22 A Dynamic Internet Threat Environment 97,812 Internet security incidents reported in 2002 (source: CERT) Average company suffered losses of $475,000 due to Blaster worm (source: TruSecure) More than half of the Top 20 Most Critical Internet Vulnerabilities are application-based (source: SANS/FBI)

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 23 Today’s Top Security Concerns Security: A Big Challenge! New Constituents; Partner Web Access; WLAN; Remote Employees New, Dynamic Security Threats IT Budgets are Constrained Security Breach: Network Downtime, Lost Revenue, Damage to Corporate Reputation Dedicated Security Resources are Limited

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 24 Why is Security Such a Big Challenge?  In a connected world everyone is a target  Attacks spread quickly  Multitude of distributed systems to protect and connect Security Must Be:  Reliable  Extensible  Centrally Manageable  Multi-layer  INTELLIGENT - to respond to attacks before they happen!

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 25 The World’s Most Intelligent Security Solutions Perimeter – Internal – Web SMART management Worry-free protection Intelligent Security Solutions Perimeter In-depth inspection Internal Web

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 26 Internal Web Perimeter Unique Technologies are the Foundation of Intelligent Security Core Technologies Intelligent Security Solutions In-depth inspection Worry-free protection SMART management

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 27 Check Point INSPECT – Industry Leading Security Technology  Integrated Network & Application Protection  Type-Based Approach (not reliant on signatures)  Most Comprehensive & Adaptable –Programmable –Supports more than 150 applications –Fast! Physical (Layer 1) Data Link (Layer 2) Network (Layer 3) Transport (Layer 4) Session (Layer 5) Presentation (Layer 6) Application (Layer 7) Stateful Inspection Application Intelligence In-depth INSPECTion Introduced in 2003!

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 28 Security Management Life Cycle Security Management Life Cycle Define Policy Easy-to-use Graphical interface Graphical policy visualization Monitor & Report Real-time monitoring Instant status of all security elements Automatic reports Analyze & Change Detailed logging Enforce Security Stateful Inspection Application Intelligence SMART Management Lowest Total Cost of Ownership Lowest Total Cost of Ownership - Automated administrative tasks save time and money - Centralized information database minimizes capital expenditures

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 29 OPSEC - Best of Breed Applications  Authentication  Authorization  Application Service Support  Content Security  Intrusion Detection & Prevention  Wireless Enterprise Management Reporting & Monitoring Security Assessment High Availability & Load Balancing Acceleration OPSEC Applications Security Enforcement Management Performance & Availability  Industry-standard framework for integrating best-of-breed security technologies  Certified to ensure seamless interoperability Certified for Seamless Interoperability!

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 30 Strong, Broad Partnerships  Value Added Solution Providers  Certified Support Partners  Authorized Training Centers  Global Solution Providers  Managed Service Providers  Check Point Service & Support Over 1,900 channel partners in 86 countries Over 1,900 channel partners in 86 countries

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 31 Compartmentalizing the network Contain threats Desktop protection Server protection Data center security Check Point Intelligent Security Solutions Web Security Perimeter Security Attack protection Secure office connectivity Remote employee access Controllable Internet access Easy access Unified front end Integrated Authentication Content Verification Internal Security Coming Soon!

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 32 SmallBusinessCellular/MobileInfrastructure Data DataCenter Complete Market Coverage ServiceProviderHigh-EndEnterpriseMediumBusiness Market Segments Check Point Express VPN-1 Pro VPN-1 GX VPN-1 VSX VPN-1 Pro SecureClient VPN-1 Edge SMP Security Management Portal InterSpect

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 33 A Future of Innovation Dedicated to staying one step ahead of customers real-world security challenges deployments Broader content analysis Deeper Smarter security management Broader Deeper Smarter Application Intelligence Stateful Inspection/ FireWall OPSEC 1997 VPN Next Generation 2001 SmartDefense