©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

McAfee One Time Password
OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Module 3 Windows Server 2008 Branch Office Scenario.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Data Encryption Overview South Seas Corporation Jared Owensby.
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
Desktop Virtualisation Sarah Mannion Desktop Technical Specialist Microsoft UK
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
VMware vCenter Server Module 4.
Module 16: Software Maintenance Using Windows Server Update Services.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Network Security Professor Professor Dr. Adeel Akram.
Wally Mead Senior Program Manager Microsoft Corporation.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Virtual Desktops and Flex CSU-Pueblo Joseph Campbell.

1 FirePass 6.0 Sales Training. 2 Agenda FirePass 6.0 Release Highlights Packaging & Pricing Product Availability Q&A.
Module 4: Add Client Computers and Devices to the Network.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Week #7 Objectives: Secure Windows 7 Desktop
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Chapter Fourteen Windows XP Professional Fault Tolerance.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
V-Alliance Solution Overview Years of Business Success.
Configuring Network Access Protection
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing South Seas Corporation.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Microsoft Management Seminar Series SMS 2003 Change Management.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
Managing and Monitoring the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
verifone HQtm Estate Management Solution
User and Device Management
Service Pack 2 System Center Configuration Manager 2007.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
What’s New in Fireware v WatchGuard Training.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
System Center 2012 Configuration Manager Service Pack 1 Overview.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
LANDesk Software Confidential Data Analytics LANDESK Day 5. March 2014 Jan Pisarik Technical Presales Manager.
Basharat Institute of Higher Education
2016 Citrix presentation.
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Check Point Connectra NGX R60
CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing
Presentation transcript:

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010

2 2©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion

3 3©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion

4 4©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security today Our current portfolio R73 (HFA1) Abra Mobile clients (VPN, Encryption)

5 5©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 Evolution Unified Client Project

6 6©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 Unified Endpoint Protection Best of breed Components ► Data Security ► Network Security ► Remote Access components Provides full security coverage Flexible & Modular Deploy what you need now, add what you need in the future Multiple component and suite deployment options

7 7©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 – Data Security Full Disk Encryption protects data at rest Combines full hard drive encryption and pre-boot authentication Media Encryption protects your removable medias Combines Media Encryption and Port Protection

8 8©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 HFA1 – Network Protection Not just a firewall Innovative Network Protection Technologies Program Advisor, WebCheck Complementary Anti-Malware Award-winning, high-performance

9 9©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 HFA1 - Remote Access Choice of two VPN clients: Endpoint Connect ► Smart connection, whatever the network or connectivity challenges ► Transparent “in the office” user experience ► Embedded hot-spot handling ► 32- and 64-bit client support Legacy SecureClient ► Ensuring topology and deployment compatibility

10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 – New features Support of Windows 7 New Anti Malware engine ME new features Serial ID device filtering Nero v9+ support for CD/DVD encryption Local File & Folder Encryption FDE Support of IRRT enabled laptops (Dell E-Series) Improved client-side performance

11 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Fast User Experience Lowest CPU and Memory Utilization Check Point McAfee Symantec Check Point McAfee Symantec System Boot Time Memory footprint Seconds Endpoint and Data Security on Windows XP SP3 Source: Check Point Labs Megabytes

12 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Fast User Experience Fastest Anti-malware Scan Time Check Point McAfee Symantec Check Point McAfee Symantec Anti-malware INITIAL scan time Anti-malware RECURRING scan time Seconds Anti-malware tests on Windows 7 Source: Check Point Labs Seconds

13 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 HFA1 – What's new Support of Windows Server 2003 and bit FDE new features Supports latest intel chipset Supports hibernation on 64bits OS ME new features Encrypted client-side logs & profiles Temp folder drive/location definition Remote Help for non-AD users WebRH AD integration Support of SQL Server 2008 SA new features Server Support for Anti-malware Check Point R71 management support

14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Abra R70 Turn any PC into a corporate desktop USB-based form factor with HW/SW encryption Requires no admin, host OS, or reboot On- and off-line working modes supported Keep mobile data secure Secure Workspace isolates/protects data from host Central SW policy controls applications & features Maintain secure connectivity Provide flexible, secure access to corporate resources, info repositories, and applications Leverage existing CP gateway protections/features

15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Mobile Clients VPN client is available on the following platforms: Windows Mobile Symbian And now iPhone (SecureConnect) Encryption is available on the following: Windows Mobile Symbian

16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion

17 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80 Evolution Unified Management Project Unified Client Project 2,5 years of development

18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | A new era in Endpoint Security! Central Management Simple, Flexible Enhanced Monitoring

19 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Unique Core Values Truly Unified Management Organization-centric Management Simple, efficient policy definition Flexible client deployment Enhanced Monitoring Leveraging CP Infrastructure Comprehensive & Innovative

20 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Truly Unified Management ► All endpoint blades and policies managed from the same place ► Consistent look and feel ► No nested admin console ► One component to install ► All endpoint blades and policies managed from the same place ► Consistent look and feel ► No nested admin console ► One component to install

21 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Organization-Centric Management ► Assignment Policy Model based on organization ► Policies can be assigned based on connectivity state and/or compliance level ► Leverage current AD architecture to manage & monitor endpoints ► Assignment Policy Model based on organization ► Policies can be assigned based on connectivity state and/or compliance level ► Leverage current AD architecture to manage & monitor endpoints

22 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Simple, Efficient Policy Definition ► Best practice out of the box policies protect endpoints quickly ► Advanced configuration options always available for added granularity ► Best practice out of the box policies protect endpoints quickly ► Advanced configuration options always available for added granularity

23 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Flexible Client Deployment ► Ability to create MSI package for deployment ► Device Agent only or featured package ► Full handling of client deployment based on policy ► Ability to create MSI package for deployment ► Device Agent only or featured package ► Full handling of client deployment based on policy

24 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Enhanced Monitoring ► Full view on current endpoint status and events ► Customizable & Exportable ► Adaptable Drill-down reporting based on organization level ► Full view on current endpoint status and events ► Customizable & Exportable ► Adaptable Drill-down reporting based on organization level

25 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Leveraging CP Infrastructure ► Combined Network & Endpoint Log Management provides total security view – useful for compliance ► Sharing of Network Objects and Administration provides stronger, simpler security ► Combined Network & Endpoint Log Management provides total security view – useful for compliance ► Sharing of Network Objects and Administration provides stronger, simpler security

26 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Comprehensive and Innovative ► Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security ► Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing ► Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security ► Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing

27 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion

28 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Conclusion Check Point continues to improve its portfolio with innovative and performant solutions R73, Abra, SecureConnect for iPhone Later this year, R80 will bring us to a new way of managing Endpoint Security After being the first one to release a (really) unified client to the market, no doubt that we will be the first one to release a (really) unified management

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Questions?

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Thank you!