1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th.

Slides:



Advertisements
Similar presentations
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
Advertisements

Laptop Security in the current IT world W3 group.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Handheld Contact Wireless syncing ACT! Blackberry and Windows Mobile 5/6.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Which server is right for you? Get in Contact with us
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Unified Logs and Reporting for Hybrid Centralized Management
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
RSA SecurID November 10, 2005.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
1 Ingram Micro ExSP Jay Epton Director, New Routes to Market – UK & Ireland.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
RDX: REMOVABLE HARD DISK STORAGE SYSTEM December 2010.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
THE EASY WAY TO STAGE ZEBRA’S ANDROID MOBILE COMPUTERS
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Network Security Update IDG Security Forum th of April 2008 Péter L. Juhász, Sales Manager South East Europe.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Secure Services Shared Hosted MS Exchange 2010.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Customized Solutions to your needs
Booklet365 Office 365 Outlook Add-In Makes Easy Work of Managing Schedules for Fitness Gyms, Sports Associations, Trainers, and Their Customers Partner.
Lecture 14: Business Information Systems - ICT Security
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Check Point Connectra NGX R60
Implementing Client Security on Windows 2000 and Windows XP Level 150
PLANNING A SECURE BASELINE INSTALLATION
Microsoft Data Insights Summit
Microsoft Virtual Academy
Presentation transcript:

1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th March, 2009 Ross Baker Sales Manager Data Security

2 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. A Global Security Leader * Frost & Sullivan Global leader in firewall/VPN* and mobile data encryption More than 100,000 protected businesses More than 60 million consumers 100% of Fortune 100 customers 100% security 100% focus on information security >1,000 dedicated security experts Protecting networks and enterprise data Global ~1,900 employees 71 offices, 28 countries 3,000 partners, 88 countries HQ in Israel and U.S. Leader

3 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point, not just Network Security

4 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Time line Dec 2008 Sales at 30% growth April 2008 Data Security function evolves in “endpoint” Pointsec & Reflex Magnetics evangelise data security idea Dec 2007 Strong Data Security Sales Estimate 50%+ growth in 2008 April 2007 Check Point & Pointsec teams integrate Jan 2007 Check Point acquires Pointsec for $620m

5 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

6 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Mobile Device Hierarchy Enables:  Faster processing (Remote work on large files)  More wireless network connection options (Access to company data)  Increased storage capacity (Sensitive data at risk) Employee & Client Information and Intellectual Property (R&D, HR) Access Information (Passwords) Data (Push s) Contacts, Calendar Laptops USB CD DVD PDAs Smart Phones Cell Phones Content Sensitivity & Threat Potential Climbing Up Mobile Device Complexity

7 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Mobile Device Hierarchy Enables:  Faster processing (Remote work on large files)  More wireless network connection options (Access to company data)  Increased storage capacity (Sensitive data at risk) Employee & Client Information and Intellectual Property (R&D, HR) Access Information (Passwords) Data (Push s) Contacts, Calendar Laptops USB CD DVD PDAs Smart Phones Cell Phones Content Sensitivity & Threat Potential Climbing Up Mobile Device Complexity

8 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The risks for the mobile executive  Lost device – laptop, PDA, phone and USB media  Unauthorised access using hotel, airport or serviced office hotspots  Theft or malicious attack  Stupidity  Remote working practice not subject to corporate scrutiny 78% of companies that had their computers stolen did not encrypt hard discs BERR 2008 Information Security Breaches Survey

[Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

10 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Product Combinations Check Point Endpoint Security Suite Full Disk Encryption Personal Firewall Host-IPS / 802.1x NAC VPN Client Media Encryption Port protection Antivirus Anti-spyware Endpoint Security Client R70

11 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Endpoint Security Pricing

12 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security

13 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. TCO is important right now… Check Point can help

14 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. We have a security hole! Enterprises stock up Niche solutions Different vendors Enterprise stock more products

15 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.  Never enough security  Increased administration time and costs  Multiple test cycles – every time an agent in updated Endpoint Security Challenges  Too many security agents to manage  Multiple admin consoles – a console for each agent  Software compatibility issues between separate agents Resulting in…

16 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The Suppliers

17 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The Suppliers - Today

18 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. About the market - Supply out-weighs demand - The opportunity is clear - Is Endpoint already a commodity? - Public Sector particularly lucrative - Fine balance between functionality and cost - Channel role is vital (relationship selling) - Resellers deciding which vendor to back - Market is encouraging reseller competition - More than 50% of Companies in the UK have NO solution - IT staff at end user sites lack technical expertise in this space - First to the customer sets the expectation

19 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. What we see in RFP’s  Protect organisation's information & reputation  Commitments to installation and performance  Provide a highly available, scalable & reliable Infrastructure  Lower the operational cost  Increase effectiveness of doing business  Technological superiority of the solution  Vendor financial stability

20 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Be aware of all cost components *** Some may apply

21 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Back to basics Anyone lost a laptop lately?

22 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Encrypted text r?QrÙm¨®$åÝè¥,#8PHé‘›êè£&ÁWVð’¡‚x[¶t¼”ÅÍHÌpbdåÔ{Âß HêG®8ššaò° Òëç8ü‰·Ü6U&æUmë„dk1A+žpðrɌݣ ±÷Pš¹™Ð_²Æ‰·ó †Óò8V×o-! ±ÕŸ}„‘ÒU ¥ö»Å½" ž8ÚC~å¤kz]ŸšBeŠ8ÒÃDÍfLYð8FÝ®ÙõrOÊo^Ïðxžó– P_î.­Övlx"ÏŽÅ·¥nbÓ†² ÌPy¥.ÿ&±×QÉ\ ‰ë8y˜öc‰kÜä‚ï¤$ ‹rÞØ~?(IêUiJNÓWÒP‹ÿ:ØïãüV$ÚYä\i%ñZRW¬©þ­`„…â.ÑX õ†ƒ;ÄQ§ ŽENRåncƒ8n’ž.Ï‹B+¨P`Fb¤r¦:ÔÁ",«=Mø#§†PªW ±B›ÜÒ|üWùÐüÑüc.&ï¶'mE|^´søÔúW™VOµ›]œ†±Â3 ?ÙÂgL±›¤°H’†µ+Z<γ³vmE­‡‰3¯ƒµ·Ÿf œkI×3É]±6 u‚ß+z»>t\Op â–è+6dÚ2'H]Йˆ?Ü̲»ÏÜTɆî]3Rtvç§è«üªYÜr5äq¨¢ÝÙ»Êè´Wyýl^€)Ÿ·JϹÂä2îp1³ F׶„À ÂÂKÀÃ$nÏÅÖLå×DLÉ4”jµ\Âz|àS¹pA€1°™íwhÍs¿‚¨a¢mžëFÁU;àïρéq„Õ"szv¬t$«ï2 SÑ·×È¡4ÝmœÜ=ûÝWžÒßQ+g®fUi–t’¢Ë‹ü" zøÅP+9%ù¤Ùë Õ‘HzÕ?(I<9w;ö\¨ ;ÃÄ£ªÐ¸çø¸1K­¼¸©1|Üaa_ʼЄ!Úô©FÕñ¿J%ŽxòÓIjx»9’&è⺩ŽfÛjeÓ·#}– bÖ]qõHß3¶c³:2‰µ/Þ÷ ë,ÒŒj-ÎX¢ª§ã72Š‚ý£ñt „R  ™¦ó?ªØÏ,ŠAœ{Э¯GzÇ—O ¹ÒOÿ¼â`‡3ï[bï£æ<Oæá°"óÐ è6¡I‡ò6…é¥ô~´¿œ’|ã¾(‚;(¦Ê ù _m#Q„2à À‹‰6xPÙ|I}f4ŽØ¸Š2–PJjÚ€¡Ã¦K—u&¡ðŽb¾ºv¶ `ê©‚Ð9ô3ïÌ5(;ÈÖc™87ºäÁðóÚ+«ú~I¾ `JŸ/1%â>² ¿%ÐaAŒ c"kHÐ

23 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Master Boot Record Mandatory Access Control Modified Partition Boot Record Operating System System Files (PW Swap etc.) Full Disk Encryption Check Point Data User Data Unprotected Highly Sensitive FilesBoot Records MBRPBRDataOperating System System Files (PW Swap etc.) File Encryption MBRPBRDataOperating System System Files (PW Swap etc.) Check Point End Point Full Disk Encryption Secured Information Open Information The Check Point solution provides the most complete & comprehensive protection for all data!

24 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The Insider Threat Companies are fully aware that employees pose a growing risk to data security. Recent press articles highlight two types of insider threats: Malicious attack by employee (Intentional) Unintentional Security Breach (Unintentional)

25 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Setting the Scene One USB flash drive in the wrong hands, and your firewall is useless! 80 % of security breaches are caused by insiders… evenly important is the risk of introducing malicious code in the corporate network. USB flash drives’ form factor makes them easy to lose.

26 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Product Operation Endpoint PC Check Point Endpoint Media Encryption Centralized Auditing and Management Audit utility provided for initial assessment of port usage and security policy planning WiredWirelessDevices USBBluetoothMemory cards FirewireInfraredDigital cameras SerialWiFiMusic players PrinterModems IDESmart phones Printers Keyloggers Controls Activity on ports and devices including:

27 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Device Discovery Knowing the scale of the problem Requires no software installation Provides a complete snapshot of device activity Extensive exportable HTML reports summarise device activity and can be used to provide business case Essential Pre sales utility

28 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

29 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

30 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

31 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Product Availability  Server and client software can be obtained via download from or through the new Endpoint Security media kitwww.checkpoint.com

32 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Target Customers  Existing Check Point customers  Current users of Pointsec / Reflex  Companies with Encryption projects  Companies embracing mobile working  Companies reducing supplier numbers  VPN upgrades & competitive upgrades  Disgruntled Symantec & McAfee users  Customers asking “for that memory stick blocking stuff”

33 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Which partners will be most successful?  Those who embrace the whole portfolio  Partners who invest in the solution technically  Partners who understand our licensing  Those who work closely with us  Partners providing true “value add”  Those who make use of our sales tools  6 /10 partners are silver/bronze partners

34 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Online Dashboard Instant compliance views

35 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Single policy view Simplified security policy

36 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. “PC on a stick” Who should use it?  Day extenders, consultants, contractors or employees who work from business centres – Anyone that works from unmanaged devices!  Disaster recovery solution What is it? secureportabledissolvable  A completely secure, portable and dissolvable virtual workspace, includes Check Point endpoint technologies  Centrally managed, integrated with Remote Help Available in Q2 2009

37 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. **** If Laptops are easy to lose presenting a massive security risk – What about Smart Phones / PDA ’ s? Data Security 2009 ****

38 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Any Questions?  Ross Baker   Tel –