©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
Optimizing the User Experience Throughout the Infrastructure Consolidation Process Dan Smith, Enterprise Solutions Manager, GTSI Chris Theon, Practice.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Security Observations & Ideas from the field
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Unified Logs and Reporting for Hybrid Centralized Management
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Norman SecureSurf Protect your users when surfing the Internet.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Visibility & Control – Identity, Application & Content Awareness.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Dell Connected Security Solutions Simplify & unify.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Network Security Update IDG Security Forum th of April 2008 Péter L. Juhász, Sales Manager South East Europe.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
The Changing World of Endpoint Protection
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone SmartEvent (Intro) Антон Разумов Консультант по безопасности.
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Ilija Jovičić Sophos Consultant.
Barracuda Web Security Flex
Barracuda Web Filtering Service
Self-service enrollment for Windows desktops
Secure Software Confidentiality Integrity Data Security Authentication
Threat Management Gateway
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Secure & Unified Identity
Check Point Connectra NGX R60
Secure once, run anywhere Simplify your security with Sophos
Chapter 4: Protecting the Organization
(With Hybrid Network Support)
Presentation transcript:

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D Security March 2012

2 2©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Security Focus and Leadership ► $ 1.25 Billion (Revenue) 2011 revenue, 17% CAGR Software Blades strategy fueling growth ► 100% (Security) Pure focus on security All of Fortune 500 are Check Point customers ► # 1 (Threat Coverage) Best coverage for Microsoft and Adobe vulnerabilities Largest Web 2.0 application control library Who should you trust to secure your business?

3 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Hospital record update Online bank balance check Social network update Supermarket checkout PDA check Credit card payment ATM withdrawal Remote data backup ERP supplier catalog update Opening of a new branch Setup a mobile office at a client Check today’s sales orders Update this year’s bonuses Log into a WiFi hotspot Securing Business Everywhere 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

4 4 The 3 Steps of Modern Attacks Social engineering  Identify target  Gather information  Launch attack  Identify target  Gather information  Launch attack Malware injection  Attack arrives  User clicks  Exploit executes  Attack arrives  User clicks  Exploit executes  Malware installed  Computer controlled  Waits for instruction  Malware installed  Computer controlled  Waits for instruction Remote control

5 5©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Two Sources of Vulnerability Human Technology

6 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | People do not read policies 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

7 7 We use millions and millions of lines of code Complexity leads to vulnerability 7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

8 8 Everything needs to be patched again and again

9 9©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | More than technology… …A security process More than technology… …A security process Enforcement Policies People INTRODUCING…

10 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Business Terminology for Policy? Using different IP addresses Using different devices Using different locations Using different applications 200,000 SECURITY LOGS 10©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

11 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Business Relevant Policy Clear and Meaningful Policy 11©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

12 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Today’s Typical User ‘Involvement’ NO EXPLANATION NO EXPLANATION NO RESOLUTION

13 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Users Taking Part in Security EXPLANATION RESOLUTION

14 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 3D SECURITY: GAIN CONTROL Enforcement Policies People

15 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Software Blades MOBILITYDATAMALWARE AUTHORIZATION DEVICE SECURITY VPN DISK ENCRYPTION DLP REMOVABLE MEDIA FIREWALL ANTIBOT WEB/APP CONTROL IPS ACCESS CONTROL Coordinated Layers of Security

16 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Consolidate Security—Better Security ALL LAYERS OF SECURITY ACT TOGETHER Software Blade Architecture from Check Point

17 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Granular Control of All Security Layers Granular Visibility Identity Awareness DLP Mobile Access SmartEvent IPS Anti-Bot Antivirus Application Control URLF

18 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Consolidated Visibility: SmartEvent  Unified event analysis with 360° visibility across Software Blades  High-level view with drill down to policy  Unified event analysis with 360° visibility across Software Blades  High-level view with drill down to policy

19 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | More Security, Additional Power The Security You Want The Performance You Need DLP Software Blade Application Control Software Blade IPS Software Blade Firewall and VPN Software Blades URL Filtering Software Blade Antivirus & Anti-Malware Software Blade Identity Awareness Software Blade Anti-Bot Software Blade

20 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point Security Appliance Line Ultra High-End Datacenter Grade Enterprise Grade Small Office / Desktop SECURITY FOR ENTIRE RANGE Appliances 4000 Appliances 2200 Appliance System and Appliance

21 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point Security Solutions IAS and Open server 2012 Appliances All Deployments All Platforms All Protections Software Blades

22 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | More Security, More Powerful Platforms Summary Multi-Layer Threat Prevention with Software Blades 3D Security: Blueprint for a 2012 Security Strategy Check Point: Your Trusted Security Partner

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Thank You