©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.

Slides:



Advertisements
Similar presentations
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
The Most Analytical and Comprehensive Defense Network in a Box.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Security Observations & Ideas from the field
Unified Logs and Reporting for Hybrid Centralized Management
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Norman SecureSurf Protect your users when surfing the Internet.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
The Most Analytical and Comprehensive Defense Network in a Box.
Dell Connected Security Solutions Simplify & unify.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The Changing World of Endpoint Protection
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
IS3220 Information Technology Infrastructure Security
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Internet of Things. Creating Our Future Together.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Complete Cloud Security Anyone, anywhere, any app, any device.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
Blue Coat Cloud Continuum
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Barracuda Web Security Flex
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hank Johnson, Area Manager Check Point Software Technologies
Secure & Unified Identity
Prevent Costly Data Leaks from Microsoft Office 365
Company Overview & Strategy
Check Point Connectra NGX R60
Secure once, run anywhere Simplify your security with Sophos
DATS International Portfolio.
Presentation transcript:

©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS & IDEAS FROM THE FIELD

©2015 Check Point Software Technologies Ltd. 2 What’s driving Security Spending ? Upgrade of existing, aged equipment Consolidation of multiple point products Consolidation + New Security Features Compliance Executive Support & Demand for ITSec Security Readiness – Where are you ?

©2015 Check Point Software Technologies Ltd. 3 Security is now Mainstream IT Redefinition of the Enterprise:  Remote Locations ( Mfg / Branches/ IP devices)  Mobile Devices ( where is the “Edge” ? ) A Good Offense is the Best Defense:  Advanced Threat Protection = Known & Unknown  Reporting & Forensics = SOC & Trending Data +Context + Visibility = Actionable Intelligence

©2015 Check Point Software Technologies Ltd. 4 Security Trends ** Redefine the Enterprise: Remote sites & Mobile **Client Execs involved at a new level ** Security Readiness Data : Dashboard, Detail & Forensics Product Enterprise Security Strategies Monitor / ReactProactive / Trend User Involvement

©2015 Check Point Software Technologies Ltd. 5 Security has been underfunded… By other valid IT & Business Priorities including:  IP Telephony / Unified Communications  Storage & Server Virtualization; Converged Computing  SAP, Oracle, other applications  SF.com & other CRM systems  Cloud & Hybrid Data Center Initiatives  Impact to Security:  Most are in Catch Up Mode  Security is “MainStream”  Key issues:  Personnel / Organizational Structure  Policy ( Social media, Document Retention, Breach planning )  Strategy ( Current State to Future State )

©2015 Check Point Software Technologies Ltd. 6 [Restricted] ONLY for designated groups and individuals

©2015 Check Point Software Technologies Ltd. 7 [Restricted] ONLY for designated groups and individuals Self Assessment Start Here

©2015 Check Point Software Technologies Ltd. 8 Client Assessments: Work to be Done 1 st Key Question : “Where am I today?” Follow up questions: Desired Future State First Priority What’s possible today Where do I start

©2015 Check Point Software Technologies Ltd. 9 Minimize Risk & Shorten the Curve Have a Current State – Future State roadmap Anticipate Future Requirements ( Leads to proper sizing ). Consider a “Good – Better – Best “ architectural review Invest in Training.

©2015 Check Point Software Technologies Ltd. 10 High Level Security Planning Framework - 4 things Infrastructure Threat Mobility Management & Visibility

©2015 Check Point Software Technologies Ltd. 11 [Restricted] ONLY for designated groups and individuals Fewer Suppliers & Maintenance contracts More control & reporting Fewer Suppliers & Maintenance contracts More control & reporting DLP Software Blade Application Control Software Blade IPS Software Blade Firewall and VPN Software Blades URL Filtering Software Blade Antivirus & Anti-Malware Software Blade Identity Awareness Software Blade Anti-Bot Software Blade Infrastructure Consolidation is real but you own Architecture

©2015 Check Point Software Technologies Ltd. 12 Granular Control of All Security Layers Granular Visibility Identity Awareness DLP Mobile Access SmartEvent IPS Anti-Bot Antivirus Application Control URLF

©2015 Check Point Software Technologies Ltd. 13 Check Point Research Industry Feeds Sensors & Sites Priority: Keep System Software Current

©2015 Check Point Software Technologies Ltd. 14

©2015 Check Point Software Technologies Ltd. 15 One of the most dynamic areas of Security Threat Prevention

©2015 Check Point Software Technologies Ltd. 16 Known ( IPS / IDS / URL / App ) Unknown ( SandBox / Zero Day / APT ) & Mobile Reporting / Context / Forensics / Trending

©2015 Check Point Software Technologies Ltd. 17 Polymorphic Malware APTs Mobility We Spend Time and Budget On.. While Positioning for Future Challenges TODAY’S INFRASTRUCTURE FUTURE ATTACK VECTORS Firewall VPN IPS Anti-Spam URL Filtering Anti-Virus DDoS Have the Platform Built 1 st !!

©2015 Check Point Software Technologies Ltd. 18 Multi-Layer Threat Prevention Known and Unknown Malware Known Unknown X XXXXXX XX Known Industry Feeds Global Sensor Data Check Point Research ThreatCloud Emulation Service

©2015 Check Point Software Technologies Ltd. 19 [Protected] Non-confidential content INSPECT EMULATE PREVENT SHARE “Threat” requires a holistic view ** New CPU level solution – Stop before threats get to the OS level. Managing Unknowns Sandbox Quarantine Emulation

©2015 Check Point Software Technologies Ltd. 20 HIGHEST CATCH RATE Check Point Threat Emulation CPU-Level Threat Prevention + INTEGRATED WITH CHECK POINT THREAT EMULATION UNIQUE AND INNOVATIVE DETECTION

©2015 Check Point Software Technologies Ltd. 21 [Restricted] ONLY for designated groups and individuals You can’t manage what you can’t measure Optics & Reporting

©2015 Check Point Software Technologies Ltd. 22 What happens when things go wrong ? Event Management Log Management Security Management Management Integrated / Correlated Built-In Compliance Engin e Simplicity & Power in One Plate of Glass

©2015 Check Point Software Technologies Ltd. 23 SPOG Management & Visibility

©2015 Check Point Software Technologies Ltd o Visibility of Network Security Time shows topline security events Map shows origin of attacks and threats Rate and frequency of potential attacks Important security events highlighted

©2015 Check Point Software Technologies Ltd. 25 [Restricted] ONLY for designated groups and individuals Mobility

©2015 Check Point Software Technologies Ltd. 26 Today’s Mobile Solutions have Security Gaps [Restricted] ONLY for designated groups and individuals How do you protect devices from THREATS? How do you protect DATA wherever it goes? MDM = Management NOT Security Mobile Security Same policies as On Net APT protection Document Security Mgt & Reporting

©2015 Check Point Software Technologies Ltd. 27 Customers are still looking for a solution 70 % of enterprises see mobile support to employees as critical priority 50 % of firms see implementing a BYOD policy as critical priority 75 % of large enterprises will have deployed technologies to secure access to enterprise resources by 2016 Forrester Gartner [Restricted] ONLY for designated groups and individuals

©2015 Check Point Software Technologies Ltd. 28 [Restricted] ONLY for designated groups and individuals Has your mobile device been used … 71% of adults over 18 have a Facebook account 2 Facebook? [Restricted] ONLY for designated groups and individuals Over 30% of parents let their kids use their corporate devices 1 To access Dropbox? 1 in 5 employees use consumer cloud storage for work documents 3 By your kids? Norton Report, Oct 2013, by Symantec Pew Research Center Internet Project Tracking Survey 3 Nasuni Survey of 1300 business users as reported by GigaOm

©2015 Check Point Software Technologies Ltd. 29 ©2014 Check Point Software Technologies Ltd. 29 Infection or Loss … Easy as 1, 2, 3 SURF THE INTERNET UPLOAD FILES TO THE CLOUD FORGET DEVICE

©2015 Check Point Software Technologies Ltd. 30 Vision: Enterprise = 100% of the Enterprise ©2014 Check Point Software Technologies Ltd. 30 [Restricted] ONLY for designated groups and individuals Mobile Security must be part of the Strategy Mobile Security Single solution End to end protection APT protection Reporting & Forensics Intuitive UI

©2015 Check Point Software Technologies Ltd. 31 The Internet So many points of entry!

©2015 Check Point Software Technologies Ltd. 32 The Issues are Real The Solutions are Many Assess – Plan – Execute For the entire Enterprise Hold the industry accountable Network& Idea share ! Don’t overthink it: get after it! Final Thoughts

©2015 Check Point Software Technologies Ltd. 33 Everyone has a plan ‘till they get punched in the mouth Mike Tyson