©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D Security March 2012
2 2©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Security Focus and Leadership ► $ 1.25 Billion (Revenue) 2011 revenue, 17% CAGR Software Blades strategy fueling growth ► 100% (Security) Pure focus on security All of Fortune 500 are Check Point customers ► # 1 (Threat Coverage) Best coverage for Microsoft and Adobe vulnerabilities Largest Web 2.0 application control library Who should you trust to secure your business?
3 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Hospital record update Online bank balance check Social network update Supermarket checkout PDA check Credit card payment ATM withdrawal Remote data backup ERP supplier catalog update Opening of a new branch Setup a mobile office at a client Check today’s sales orders Update this year’s bonuses Log into a WiFi hotspot Securing Business Everywhere 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
4 4 The 3 Steps of Modern Attacks Social engineering Identify target Gather information Launch attack Identify target Gather information Launch attack Malware injection Attack arrives User clicks Exploit executes Attack arrives User clicks Exploit executes Malware installed Computer controlled Waits for instruction Malware installed Computer controlled Waits for instruction Remote control
5 5©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Two Sources of Vulnerability Human Technology
6 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | People do not read policies 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
7 7 We use millions and millions of lines of code Complexity leads to vulnerability 7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
8 8 Everything needs to be patched again and again
9 9©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | More than technology… …A security process More than technology… …A security process Enforcement Policies People INTRODUCING…
10 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Business Terminology for Policy? Using different IP addresses Using different devices Using different locations Using different applications 200,000 SECURITY LOGS 10©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
11 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Business Relevant Policy Clear and Meaningful Policy 11©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
12 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Today’s Typical User ‘Involvement’ NO EXPLANATION NO EXPLANATION NO RESOLUTION
13 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Users Taking Part in Security EXPLANATION RESOLUTION
14 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 3D SECURITY: GAIN CONTROL Enforcement Policies People
15 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Software Blades MOBILITYDATAMALWARE AUTHORIZATION DEVICE SECURITY VPN DISK ENCRYPTION DLP REMOVABLE MEDIA FIREWALL ANTIBOT WEB/APP CONTROL IPS ACCESS CONTROL Coordinated Layers of Security
16 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Consolidate Security—Better Security ALL LAYERS OF SECURITY ACT TOGETHER Software Blade Architecture from Check Point
17 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Granular Control of All Security Layers Granular Visibility Identity Awareness DLP Mobile Access SmartEvent IPS Anti-Bot Antivirus Application Control URLF
18 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Consolidated Visibility: SmartEvent Unified event analysis with 360° visibility across Software Blades High-level view with drill down to policy Unified event analysis with 360° visibility across Software Blades High-level view with drill down to policy
19 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | More Security, Additional Power The Security You Want The Performance You Need DLP Software Blade Application Control Software Blade IPS Software Blade Firewall and VPN Software Blades URL Filtering Software Blade Antivirus & Anti-Malware Software Blade Identity Awareness Software Blade Anti-Bot Software Blade
20 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point Security Appliance Line Ultra High-End Datacenter Grade Enterprise Grade Small Office / Desktop SECURITY FOR ENTIRE RANGE Appliances 4000 Appliances 2200 Appliance System and Appliance
21 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point Security Solutions IAS and Open server 2012 Appliances All Deployments All Platforms All Protections Software Blades
22 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | More Security, More Powerful Platforms Summary Multi-Layer Threat Prevention with Software Blades 3D Security: Blueprint for a 2012 Security Strategy Check Point: Your Trusted Security Partner
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Thank You