©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010
2 2©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion
3 3©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion
4 4©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security today Our current portfolio R73 (HFA1) Abra Mobile clients (VPN, Encryption)
5 5©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 Evolution Unified Client Project
6 6©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 Unified Endpoint Protection Best of breed Components ► Data Security ► Network Security ► Remote Access components Provides full security coverage Flexible & Modular Deploy what you need now, add what you need in the future Multiple component and suite deployment options
7 7©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 – Data Security Full Disk Encryption protects data at rest Combines full hard drive encryption and pre-boot authentication Media Encryption protects your removable medias Combines Media Encryption and Port Protection
8 8©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 HFA1 – Network Protection Not just a firewall Innovative Network Protection Technologies Program Advisor, WebCheck Complementary Anti-Malware Award-winning, high-performance
9 9©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 HFA1 - Remote Access Choice of two VPN clients: Endpoint Connect ► Smart connection, whatever the network or connectivity challenges ► Transparent “in the office” user experience ► Embedded hot-spot handling ► 32- and 64-bit client support Legacy SecureClient ► Ensuring topology and deployment compatibility
10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 – New features Support of Windows 7 New Anti Malware engine ME new features Serial ID device filtering Nero v9+ support for CD/DVD encryption Local File & Folder Encryption FDE Support of IRRT enabled laptops (Dell E-Series) Improved client-side performance
11 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Fast User Experience Lowest CPU and Memory Utilization Check Point McAfee Symantec Check Point McAfee Symantec System Boot Time Memory footprint Seconds Endpoint and Data Security on Windows XP SP3 Source: Check Point Labs Megabytes
12 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Fast User Experience Fastest Anti-malware Scan Time Check Point McAfee Symantec Check Point McAfee Symantec Anti-malware INITIAL scan time Anti-malware RECURRING scan time Seconds Anti-malware tests on Windows 7 Source: Check Point Labs Seconds
13 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 HFA1 – What's new Support of Windows Server 2003 and bit FDE new features Supports latest intel chipset Supports hibernation on 64bits OS ME new features Encrypted client-side logs & profiles Temp folder drive/location definition Remote Help for non-AD users WebRH AD integration Support of SQL Server 2008 SA new features Server Support for Anti-malware Check Point R71 management support
14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Abra R70 Turn any PC into a corporate desktop USB-based form factor with HW/SW encryption Requires no admin, host OS, or reboot On- and off-line working modes supported Keep mobile data secure Secure Workspace isolates/protects data from host Central SW policy controls applications & features Maintain secure connectivity Provide flexible, secure access to corporate resources, info repositories, and applications Leverage existing CP gateway protections/features
15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Mobile Clients VPN client is available on the following platforms: Windows Mobile Symbian And now iPhone (SecureConnect) Encryption is available on the following: Windows Mobile Symbian
16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion
17 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80 Evolution Unified Management Project Unified Client Project 2,5 years of development
18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | A new era in Endpoint Security! Central Management Simple, Flexible Enhanced Monitoring
19 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Unique Core Values Truly Unified Management Organization-centric Management Simple, efficient policy definition Flexible client deployment Enhanced Monitoring Leveraging CP Infrastructure Comprehensive & Innovative
20 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Truly Unified Management ► All endpoint blades and policies managed from the same place ► Consistent look and feel ► No nested admin console ► One component to install ► All endpoint blades and policies managed from the same place ► Consistent look and feel ► No nested admin console ► One component to install
21 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Organization-Centric Management ► Assignment Policy Model based on organization ► Policies can be assigned based on connectivity state and/or compliance level ► Leverage current AD architecture to manage & monitor endpoints ► Assignment Policy Model based on organization ► Policies can be assigned based on connectivity state and/or compliance level ► Leverage current AD architecture to manage & monitor endpoints
22 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Simple, Efficient Policy Definition ► Best practice out of the box policies protect endpoints quickly ► Advanced configuration options always available for added granularity ► Best practice out of the box policies protect endpoints quickly ► Advanced configuration options always available for added granularity
23 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Flexible Client Deployment ► Ability to create MSI package for deployment ► Device Agent only or featured package ► Full handling of client deployment based on policy ► Ability to create MSI package for deployment ► Device Agent only or featured package ► Full handling of client deployment based on policy
24 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Enhanced Monitoring ► Full view on current endpoint status and events ► Customizable & Exportable ► Adaptable Drill-down reporting based on organization level ► Full view on current endpoint status and events ► Customizable & Exportable ► Adaptable Drill-down reporting based on organization level
25 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Leveraging CP Infrastructure ► Combined Network & Endpoint Log Management provides total security view – useful for compliance ► Sharing of Network Objects and Administration provides stronger, simpler security ► Combined Network & Endpoint Log Management provides total security view – useful for compliance ► Sharing of Network Objects and Administration provides stronger, simpler security
26 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Comprehensive and Innovative ► Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security ► Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing ► Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security ► Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing
27 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion
28 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Conclusion Check Point continues to improve its portfolio with innovative and performant solutions R73, Abra, SecureConnect for iPhone Later this year, R80 will bring us to a new way of managing Endpoint Security After being the first one to release a (really) unified client to the market, no doubt that we will be the first one to release a (really) unified management
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Questions?
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Thank you!