©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.

Slides:



Advertisements
Similar presentations
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Advertisements

Virtual Collaboration for your Work Environment Avaya Government Solutions Presented by: Paul Gwaltney, Gino Brancatelli.
Symphony Technology Group and IBS Bookmaster Pallab Chatterjee, IBS Executive Chairman.
1 Tapping the Potential of the PBX Lindsay Kintner VP Product Management Tadiran Telecom.
Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners : Arial Copyright©2011.
Thought Leadership Portals: Drive for Transparency NAW Large Company Technology Networking Conference June 17, 2008 NAW Large Company Technology Networking.
True Unified Threat Management
1 Tadiran Telecom Presented by:. 2 In Focus 2011 Agenda  Company Overview  Market Insight  Introducing Aeonix.
Technical Troubleshooting 1. Disclaimer Vendor technology is being shared to illustrate this field and is not an endorsement of the product or vendor.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T A Return to Value: Building Real Businesses Gil Shwed, Chairman & CEO Presented.
Unified Logs and Reporting for Hybrid Centralized Management
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Ramu V. Sunkara Vice President Real-Time Collaboration Products ▲ Sales, ▼ Costs: Enable Real-Time Collaboration (RTC) Within Your Products.
INTRODUCING OUR VISION To establish a non-exclusive, international travel agency consortium where network partners have the opportunity to earn higher.
MCS Business Profile Yr Copyright (C) MCS 2013, All rights reserved. 2 MCS Business Focus MCS Business Profile MCS has a business.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center.
© 2009 VMware Inc. All rights reserved Confidential VMware: An Overview Pat Gelsinger, CEO.
Amdocs Services Reach New Heights of Success
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
F5’s BIG-IP Blade Controller - The Essential Software for Blade Server Systems May 2002 John Bigelow Vice President & General Manager, Software Business.
©2011 HP Confidential1 ©2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice ©2011 Hewlett-Packard.
Citizenship Internal Stakeholder Engagement at Abbott China.
MCS Business Profile Yr Copyright (C) MCS 2013, All rights reserved. 2 MCS Business Focus MCS Business Profile MCS has a business.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Careers Matthew Ganey, Indiana University General Mills Company of Champions.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.
SHARE IN THE SUCCESS OF A PROVEN LEADER THE NEW HORIZONS FRANCHISE OPPORTUNITY.
HP and Microsoft mobility solutions Microsoft Windows® Mobile 6.1 with HP iPAQ 910 Business Messenger Presented by: Plaza Dynamics.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
Nogues Thomas Director, Standards Coordination, NDS Ltd A “converged world” is where technology brings connectivity.
How eNet4S can benefit your project? eNet4S Software Solution Business Team Chief Technology Officer July 11, 2006.
CUONG NGUYEN PRIYA PAKHANAVAR RUSSELL ROBINSON RPC Hotels.
Large Software Projects Deborah Black Vice President, Windows Division Microsoft.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
LOGO LoginClinic, Inc. Better Care ; Better Results 206 N Gammon Rd Madison, WI 53717, USA T: F: E:
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
1 I.U. Professional Opportunities Orientation Program Kristin Gaines Manager, Global Financial Support & Services.
Arend-Jan Speksnijder Solutions Architect Microsoft Dynamics Lighthouse team Dynamics AX2009 Technical Overview and Demo (DYN301)
I.U. Professional Opportunities Orientation Program Kristin Gaines IT Manager.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Websoftex Software Solution Pvt. Ltd No: 240/A, 3rd Cross, Gokula 1st, Stage, 1st Phase Mathikere, Bangalore , Karnataka, India.
TECHNOPOLIS OYJ Access to Customers, Capital and Partners Development Services.
EPIC Connections® is a leading provider of contact center consulting, outsourcing and managed infrastructure services. Our highly qualified teams deliver.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
WELCOME TO A WORLD OF SHARING. Collaboration as a Service Service-minded vision based on cloud collaboration With a vision rooted in the belief that progress.
Cloud Agility with Performance Bridging the Performance Gap for Virtual Network Infrastructure Paul Andersen Sr. Marketing Director.
© 2009 IBM Corporation ISV Best Practices: Leveraging developerWorks to drive business results.
Virtual Private Networks
Who are we? We’re one of Europe and Asia’s top consumer finance lenders We want to help our clients realise their dreams in a financially secure way We.
Barracuda NG Firewall ™
WHY VIDEO SURVELLIANCE
SeeTestLoad.
Company Home Shopping Europe GmbH (HSE24) Headquarters Munich Industry
Speaker’s Name, SAP Month 00, 2017
Veeam Backup Repository
Big Red Cloud Offers a Simple Online Accounts Solution for Business Owners and Bookkeepers Hosted on the Powerful Microsoft Azure Platform MICROSOFT AZURE.
One Talk from Verizon One TalkSM offers a flexible, scalable phone system that combines employees’ desk phones and mobile phones using the same number.
Check Point Connectra NGX R60
WHY VIDEO SURVELLIANCE
560+ people dedicated to innovation across 5 R&D labs
Open Innovation Letter
Operations management decisions at Nokia
Presentation transcript:

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda Vice President, Network Security Products May 27 th, 2010

2 2©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone | Check Point - Global Security Leader 100% Security 100% Security ► 100% focus on security ► 1,500 security experts ► 66,000 Check Point certified professionals worldwide ► 100% focus on security ► 1,500 security experts ► 66,000 Check Point certified professionals worldwide Leader ► Global firewall/VPN leader and mobile data encryption leader ► 170,000 protected businesses, 100% of Fortune 100 ► 60 million users ► 2009 – Revenues: $924M, Net: $505M ► Global firewall/VPN leader and mobile data encryption leader ► 170,000 protected businesses, 100% of Fortune 100 ► 60 million users ► 2009 – Revenues: $924M, Net: $505M Global Footprint Global Footprint ► 2,300 employees, HQ in Israel and USA, 80 offices in 30 countries ► 3,000 partners in 88 countries ► 120 authorized training centers ► 2,300 employees, HQ in Israel and USA, 80 offices in 30 countries ► 3,000 partners in 88 countries ► 120 authorized training centers

3 3©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone | Track Record of Innovation 2009 Software Blades Establishment FireWall-1 1.0, Stateful Inspection VPN-1 Small business Application Intelligence IDS/IPS SSL VPN Web security Acquisition of Architecture VPN-1 Power, VPN-1 UTM Pointsec acquisition 1994 FW 1998 VPN 2004 UTM 0910 Power-1, UTM-1 Virtualization security Nokia securtiy acquisition Facetime Technology acquisition

4 4©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone | Check Point Security Offering Unified Management Integrated Solutions on Appliances, Servers and VM softwareblades Simpler More, Better, Simpler Security

5 5©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone | Challenge #1: Security Everywhere Customers: From Consumer & Small business (5 sites) to Huge sites (1000’s sites, 100K nodes) Users: From my dad (one out of 30,000,000 ZoneAlarm users) to the security experts System size: From SmartPhone to High-end Multi CPU machines Performance: From 100Kbit to over 100Gigabit

6 6©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone | Challenge #2: Understanding your products and customers Successful products are developed for real customers Try it yourself Ask your peers for feedback on your products We use our own products Check Point IT uses Check Point Products At Home with Consumer and Small Office Products Early Availability Program – In Production Products are for sale… - Under why customer paid? What was the value for them?

7 7©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone | Challenge #3: Distributed development groups Leverage & integrate products & technology developed by distributed groups Learn to work within distant teams and time zones. Operate as teams rather than client-service provider Give ownership of important parts to remote teams Pick up the phone, find counter parts Bridge culture, integrate different development terminology/methods

8 8©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone | Challenge #4: Innovation -Innovation Lab ++x= 1 idea2 Passionate Entrepreneurs () 1 month of the innovation lab powered by the mentor Great Success …And many other innovation tools System

9 9©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone | Product and Sales Functions in Check Point Development Customer Reach ► Marketing ► Sales (Business, Technical) ► Support & Professional Services ► Marketing ► Sales (Business, Technical) ► Support & Professional Services ► Product Management ► R&D and QA ► Security Content Development ► Product Management ► R&D and QA ► Security Content Development

10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone | Thank You To join Check Point: Mention the Tsofen Event