[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Unified Logs and Reporting for Hybrid Centralized Management
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Information Security in Real Business
Wireless Network Security
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Netop Remote Control Trusted. Secure. Experienced.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Barracuda Networks Steve Scheidegger Commercial Account Manager
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Norman SecureSurf Protect your users when surfing the Internet.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Dell Connected Security Solutions Simplify & unify.
THE EASY WAY TO STAGE ZEBRA’S ANDROID MOBILE COMPUTERS
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
StageNow The easy way to stage Android mobile computers from Zebra Technologies.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Computer Security By Duncan Hall.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
User and Device Management
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Kaspersky Small Office Security INTRODUCING New for 2014!
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Grow Your Business with the Security Leader
Grow Your Business with the Security Leader
Hybrid Management and Security
Customized Solutions to your needs
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Check Point Connectra NGX R60
Presentation transcript:

[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple

2 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved.  Endpoint Security Challenges Today  The Check Point Solution –Comprehensive endpoint security –Secure, fast and simple to use –Market leading data security –Optimized Total Security  Summary Agenda

3 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved ~9 solutions solution The Evolution of Endpoint Security Antivirus Remote access/ VPN Data leakage Firewall Antivirus Anti-spam Full Disk Encryption Media Encryption Anti- malware NAC More threats More technologies More complexity

4 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Too Much End User Complexity Security updates and patching Repeated security logons Multiple security applications Reconnecting to VPN Multiple passwords Trying to reconfigure VPN

5 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Fast-Growing Web Threats VC's automated Twitter feed spreads malware BusinessWeek site hacked, serving drive-by exploits Drive-By Download Poisons Google Search Results May, 2009 September, 2008 June, 2009 Malware now spreads through the web not Forrester June, 2008

6 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. The Headache of Data Security 53% 65% 12,000 61% of professionals have confidential data on their laptop don’t protect them stolen laptops in U.S. airports/week of data breaches due to lack of policy enforcement Dell & Ponemon Institute, Airport Insecurity: the case of lost laptops, June 30, 2008

7 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. More Regulations, More Compliance PIPEDA PCI HIPAA SOX Gramm-Leach-Bliley Act 95/46/EC European Union Directive DPA Data Protection Act Indian IT Act of 2000 Privacy Act 1988 Japanese Law Personal Information Protection Law

8 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Endpoint Security Needs Highest level of endpoint protection Simplified user experience Corporate data loss prevention Reduced complexity

9 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved.  Endpoint Security Challenges Today  The Check Point Solution –Comprehensive endpoint security –Secure, fast and simple to use –Market leading data security –Optimized Total Security  Summary Agenda

10 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security 2008 The First and Only Single Agent for Endpoint Security 2009 Introducing Endpoint Security R73

11 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Market-Leading Data Security Transparent and Simple to Use Comprehensive Endpoint Protection Optimized Total Security

12 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Comprehensive Endpoint Protection

13 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Complete Endpoint Security Most comprehensive endpoint solution in a single agent  Integrated VPN  Integrated data security Innovative levels of protection  WebCheck Secure Browsing  Program Control

14 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Most Secure Endpoint Security Check Point WebCheck  Dual browser mode  Segregates corporate data from the Internet  Isolates potential threats in the virtual browser sandbox  Protects against drive-by downloads and phishing attacks Trusted siteUntrusted siteWebCheck enabled Stops Web threats at the browser

15 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point WebCheck ThreatDescription Traditional Endpoint Security Drive-by downloads Stealth download of malware via browser vulnerability Secure virtual browsingSignature update (if available) Drive-by downloads via external plug-in Stealth download of malware via plug-in process launched outside the browser Secure virtual browsingSignature update (if available) Drive-by download via toolbar plug-in Stealth download of malware via vulnerable toolbar plug-in Secure virtual browsingSignature update (if available) Highest level of protection

16 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Authorized Applications Check Point Program Control Protect from malware by controlling endpoint applications  Lock down endpoint to reduce support costs and complexity  Easy to maintain with Program Advisor service automating application policy decisions

17 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Transparent and Simple to Use

18 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Transparent User Experience InterfaceSingle AgentSingle UpdateSingle ScanSingle LogonSingle

19 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Data security Endpoint Windows VPN Check Point OneCheck Single Logon OneCheck Reduce complexity of multiple authentications Transparent and simple to use

20 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Stay connected on the move Connect securely from hotspots Configure new connections automatically VPN Auto Connect Automatically reconnect when moving between networks (LAN, WiFi, GPRS) Automatically open hotspot registration page immediately upon connection Determine the correct configuration and connect automatically Transparent and simple to use

21 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Transparent and Fast Smallest disk footprint after install Smallest memory footprint (before, during and after scan) Fastest scan in the industry (62% faster than closest competitor) Fastest Web page download with WebCheck enabled

22 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Market Leading Data Security

23 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Data Security Full Disk Encryption Complete data security with 256-bit encryption File /folder encryption Pre-boot authentication Enforce password policies with more than 100 different smartcard models Media Encryption Control all activities and access on ports Transparently encrypt all removable media Control data loss on all endpoints

24 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Secure data on all platforms Highest level of certification Recognized across the industry Data Security Market Leader Mac Linux Smartphones Windows 7 Best Mobile Device Solution Product Excellence Encryption Solution Leader in Magic Quadrant 9 Years in a Row Gold Medal 2009 Reader’s Choice Awards

25 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Rapid Large-Scale Deployment EW mode Eliminate management scalability serverless management Flexible agent Deploy only what you need Open architecture Co-exist with 3 rd -party products Windows-integrated logon Data security with no user disruption Endpoint distribution utility Use existing installation tools Meet compliance objectives and secure corporate data now! 150,000 endpoints encrypted, failure rate Telecommunications Company 50,000 endpoints secured in 30 days Government Agency

26 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Optimized Total Security

27 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Total Security Challenge Today Lack of policy orchestration Weak threat coverage Infrastructure duplication Separation of endpoint and network security

28 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Cooperative Enforcement Built-in Network Access Control  Control endpoint access to corporate network  Coordinate network and endpoint security policies Enforce endpoint compliance  Quarantine non-compliant systems QUARANTINED

29 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Security Infrastructure Optimization VPN VPN GatewayVPN Client NAC NAC on GatewayNAC on Client Network SecurityEndpoint Security Server consolidation Simple management Simple deployment

30 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Worldwide coordinated network and endpoint threat research Unified Threat Research Update Protection against Microsoft Office Web Components Multiple ActiveX Controls Remote Code Execution Vulnerability (MS09-043) Endpoint Security R72 Security Gateway R70 VPN-1 NGX R65 IPS-1 Protection Provided by: CVE CVE Industry Reference MSFT Security BulletinSource: CriticalSeverity: 15-Jul-09Date Published: CPAI Check Point Reference: OverviewDetailsProtection Subscribe Check Point Protection Update Unified notifications for new threats Multi-layered protection across endpoint and network security Common threat definitions across endpoint and network

31 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Endpoint Security Management Easy Deployment, Easy Management with Single Console Coming Soon

32 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Corporate data loss prevention Your Opportunity with Check Point User transparency and ease of use Best endpoint security Reduced complexity

33 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Summary Market-Leading Data Security Transparent and Simple to Use Comprehensive Endpoint Protection Optimized Total Security