©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point InterSpect ™ The Internal Security Gateway ™ ISSA April 15 th, 2004
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 2 Today’s Challenge Then: IT resources focused on network perimeter… Now: Dedicated IT resources focused on internal networks Many attacks are introduced inside the network –Laptops/PDAs travel in and out of the network daily –Legitimate, authenticated users can be contagious –Effective patching takes time Worms spread internally, very fast –Blaster –Slammer No perfect solution –Point-products address some concerns, but not the “big picture”
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 3 Currently Available Technologies Don’t Meet the Need Secure Switches/ Routers Perimeter Firewalls Anti-VirusIDS/IPS Worm Defenses --- Varies by vendor Signature and/or Response Based (Reactive) Network Zone Segmentation Limited ---Basic Quarantine --- AvailableLimited LAN Protocol Protection --- Varies by vendor Only from the host perspective Limited Pre-emptive Attack Protection --- Varies by vendor No, Requires virus definitions Limited Seamless Deployment & Management Security policy difficult to configure and manage Granular policy based on explicitly allowed traffic Requires setup on every device Cumbersome configuration, management burden
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 4 Security Considerations: Internal vs. Perimeter Perimeter SecurityInternal Security Application Environment Standard, well-defined applications Client-to-server applications Stricter adherence to protocols Typically centrally-coordinated security Homegrown applications Client-to-client applications Loose adherence to protocols No central security coordinator Default Access Control Policy Block all traffic unless explicitly allowed Allow all traffic unless explicitly blocked Priority 1.Security 2.Non-disruptive to traffic 1.Non-disruptive to traffic 2.Security LAN Protocols LAN protocols can be blockedLAN protocols must be allowed Internal security introduces unique challenges and requires a dedicated solution
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 5 Check Point InterSpect The Industry’s First Internal Security Gateway A complete security solution designed for deployment inside of networks Key Features Intelligent Worm Defender™ Network Zone Segmentation Quarantine of Suspicious Computers LAN Protocol Protection Pre-emptive Attack Protection Seamless Network Deployment and Management Interface
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 6 LAN Deployment Locations In front of a single key workgroup Behind WAN Access routers In front of server farm uplinks In front of several workgroups WAN
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 7 Comparing Related Technologies Secure Switches/ Routers Perimeter Firewalls Anti-VirusIDS/IPS Check Point InterSpect Worm Defenses ---Varies by vendor Signature and/or Response Based (Reactive) Network Zone Segmentation Limited ---Basic Quarantine --- AvailableLimited LAN Protocol Protection ---Varies by vendor Only from the host perspective Limited Pre-emptive Attack Protection --- Varies by vendor No, Requires virus definitions Limited Seamless Deployment & Management Security policy difficult to configure and manage Granular policy based on explicitly allowed traffic Requires setup on every device Cumbersome configuration, management burden
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 8 Intelligent Worm Defender™ Check Point InterSpect Key Benefits Blocks the spread of worms/attacks inside the network Protects against fast moving (flash or blitz) worms Applies Application Intelligence and Stateful Inspection technologies to internal network security
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 9 Network Zone Segmentation Key Benefits Prevents unauthorized access between zones Contains attacks within sub-segment of network Bridge Mode Router Perimeter Firewall Backbone switch Finance QA R&D Floor switch Floor switch Floor switch IP 1 IP 2 Internet InterSpect
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 10 Quarantine of Suspicious Computers Check Point InterSpect Key Benefits Isolates attacks and compromised devices Restricts infected computers from contaminating other devices Protects un-patched computers until patched When user is quarantined, user and admin is notified via dynamic web page Unique to InterSpect
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 11 LAN Protocol Protection Microsoft RPC CIFS MS SQL DCOM Sun RPC DCE RPC HTTP And more! Key Benefits Protects and supports protocols and applications used inside the network Ensures stability of internal networks Internal networks use more, and different, protocols than perimeter networks Broadest and deepest protocol inspection capability via Application Intelligence: Unique to InterSpect
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 12 Pre-emptive Attack Protection Key Benefits Proactively and dynamically protects against known and unknown attacks via SmartDefense Defends against vulnerabilities before they are exploited
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 13 Seamless Network Deployment & Management Interface Key Benefits Installs in minutes Easy to use and manage Won’t block legitimate traffic Non-disruptive install into existing network infrastructure Multiple in-line operating modes for flexible deployment Bridge Switch Router Monitor only capability GUI tailored for internal network deployment
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 14 Easily Configurable Attack Protection Monitor only options Simple Quarantine set-up
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 15 Exception List for Non-Disruptive Deployment e.g., Bypass exception allows homegrown applications to support non-standard use of protocols
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 16 Performance for Internal Security High performance is expected in the LAN InterSpect enhancements for the LAN –100% of inspection is done inside the kernel –InterSpect contains advanced streaming technologies –SecureXL is integrated into InterSpect –All inspection is accelerated
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Models and Pricing
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 18 InterSpect Model Comparison InterSpect 210InterSpect 410InterSpect 610/610F Target One workgroup protection Multiple workgroup protectionGigabit network protection Throughput200Mbps500Mbps1000Mbps List Price$9,000$18,000$36,000 / $39,000 Fiber interfacesN/AAdd-on availableAdd-on available / Included Expansions SlotsN/A11 Inspection Ports23-10 Management Port111 Max ports310 Interface speed10/10010/100/1000 VLAN Support8 VLANs128 VLANsUnlimited Redundant PowerNoOptionalIncluded SmartDefense Subscription Included for 1 st year, then optional renewal All models include: SmartDashboard for InterSpect, SmartView Monitor for InterSpect, and SmartView Reporter for InterSpect
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 20 About Check Point The most relied upon and trusted Internet security vendor –Security is all we do – and we do it better than anyone! –Used by 97 of the Fortune 100 –Established market leader in both firewall and VPN 65% market share in enterprise VPN/firewall (IDC) 36% market share in appliances running Check Point (Infonetics) Customer-driven philosophy –Industry-leading technology partnerships –Strong and diversified channel partnerships –Open business model
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 21 Stateful Inspection/ FireWall OPSEC 1997 VPN Next Generation 2001 SmartDefense 2002 Application Intelligence 2003 Check Point: Always a step ahead of customer’s real-world challenges Check Point: Always a step ahead of customer’s real-world challenges A History of Innovation
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 22 A Dynamic Internet Threat Environment 97,812 Internet security incidents reported in 2002 (source: CERT) Average company suffered losses of $475,000 due to Blaster worm (source: TruSecure) More than half of the Top 20 Most Critical Internet Vulnerabilities are application-based (source: SANS/FBI)
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 23 Today’s Top Security Concerns Security: A Big Challenge! New Constituents; Partner Web Access; WLAN; Remote Employees New, Dynamic Security Threats IT Budgets are Constrained Security Breach: Network Downtime, Lost Revenue, Damage to Corporate Reputation Dedicated Security Resources are Limited
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 24 Why is Security Such a Big Challenge? In a connected world everyone is a target Attacks spread quickly Multitude of distributed systems to protect and connect Security Must Be: Reliable Extensible Centrally Manageable Multi-layer INTELLIGENT - to respond to attacks before they happen!
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 25 The World’s Most Intelligent Security Solutions Perimeter – Internal – Web SMART management Worry-free protection Intelligent Security Solutions Perimeter In-depth inspection Internal Web
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 26 Internal Web Perimeter Unique Technologies are the Foundation of Intelligent Security Core Technologies Intelligent Security Solutions In-depth inspection Worry-free protection SMART management
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 27 Check Point INSPECT – Industry Leading Security Technology Integrated Network & Application Protection Type-Based Approach (not reliant on signatures) Most Comprehensive & Adaptable –Programmable –Supports more than 150 applications –Fast! Physical (Layer 1) Data Link (Layer 2) Network (Layer 3) Transport (Layer 4) Session (Layer 5) Presentation (Layer 6) Application (Layer 7) Stateful Inspection Application Intelligence In-depth INSPECTion Introduced in 2003!
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 28 Security Management Life Cycle Security Management Life Cycle Define Policy Easy-to-use Graphical interface Graphical policy visualization Monitor & Report Real-time monitoring Instant status of all security elements Automatic reports Analyze & Change Detailed logging Enforce Security Stateful Inspection Application Intelligence SMART Management Lowest Total Cost of Ownership Lowest Total Cost of Ownership - Automated administrative tasks save time and money - Centralized information database minimizes capital expenditures
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 29 OPSEC - Best of Breed Applications Authentication Authorization Application Service Support Content Security Intrusion Detection & Prevention Wireless Enterprise Management Reporting & Monitoring Security Assessment High Availability & Load Balancing Acceleration OPSEC Applications Security Enforcement Management Performance & Availability Industry-standard framework for integrating best-of-breed security technologies Certified to ensure seamless interoperability Certified for Seamless Interoperability!
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 30 Strong, Broad Partnerships Value Added Solution Providers Certified Support Partners Authorized Training Centers Global Solution Providers Managed Service Providers Check Point Service & Support Over 1,900 channel partners in 86 countries Over 1,900 channel partners in 86 countries
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 31 Compartmentalizing the network Contain threats Desktop protection Server protection Data center security Check Point Intelligent Security Solutions Web Security Perimeter Security Attack protection Secure office connectivity Remote employee access Controllable Internet access Easy access Unified front end Integrated Authentication Content Verification Internal Security Coming Soon!
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 32 SmallBusinessCellular/MobileInfrastructure Data DataCenter Complete Market Coverage ServiceProviderHigh-EndEnterpriseMediumBusiness Market Segments Check Point Express VPN-1 Pro VPN-1 GX VPN-1 VSX VPN-1 Pro SecureClient VPN-1 Edge SMP Security Management Portal InterSpect
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 33 A Future of Innovation Dedicated to staying one step ahead of customers real-world security challenges deployments Broader content analysis Deeper Smarter security management Broader Deeper Smarter Application Intelligence Stateful Inspection/ FireWall OPSEC 1997 VPN Next Generation 2001 SmartDefense