[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.

Slides:



Advertisements
Similar presentations
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Advertisements

DO YOU SPEAK FUTURE?. Cutting-edge technology for the development of business software applications Takes advantage of the most recent international trends,
Hello i am so and so, title/role and a little background on myself (i.e. former microsoft employee or anything interesting) set context for what going.
OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Changing the Face of Intrusion Prevention: Check Point IPS Software Blade.
Vodacom Hosted Exchange. What is Hosted Exchange? A Business-Class Messaging solution and collaboration service designed to help your business communicate.
The Efficient Fabric Presenter Name Title. The march of ethernet is inevitable Gb 10Gb 8Gb 4Gb 2Gb 1Gb 100Mb +
Cisco and NetApp Confidential. Distributed under non-disclosure only. Name Date FlexPod Entry-level Solution FlexPod Value, Sized Right for Smaller Workloads.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Scalable Security Performance.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
BI in the Cloud – Sky is the limit Vishal Agrawal Product Technical Architect Infosys Tech Ltd Anand Govindarajan Principal Technology Architect Infosys.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. Subsidiaries and affiliates of AT&T.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Network Techlab (India) Pvt. Ltd.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Visibility & Control – Identity, Application & Content Awareness.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Vantage Report 3.0 Product Sales Guide
©2014 Check Point Software Technologies Ltd Introduction [Confidential] For designated groups and individuals.
Your Business Challenges
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
SOA-21: Integrating SAP and Other Packaged Applications into your SOA Infrastructure Wayne Lockhart Sr. Product Manager.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
“How can I reduce costs and take advantage of new technologies like virtualization?” “My users are becoming more savvy and have more diverse needs. How.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
IT Support Packs. CUSTOMER SEGMENT IT Service Desk teams who provide internal and external support to traditional systems including desktops, laptops.
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Living With Your New IP PBX David M. Laurenson, VP Information Technology and CIO A. Finkl & Sons A.Finkl & Sons founded in 1879 HQ in Chicago World’s.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Department: Pre Sales1 20 th May 2009 The Journey to Total Communications James Waddington 20 th May 2009.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Mid Market Discovery Day Robert Moss. House keeping Fire exits & Mobile phones.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
The Efficient Fabric Presenter Name Title.
Barracuda Web Security Flex
Barracuda Web Filtering Service
Wireless IP products: GWN series
Logo here Module 8 Implementing and managing Azure networking 1.
How Smart Networks are Changing Corporate Networks
CCNET Managed Services
Red Hat User Group June 2014 Marco Berube, Cloud Solutions Architect
Microsoft 365 Business Customer Targeting 2/6/18
SQL Server 2012 Licensing Overview.
11/19/2018 4:38 AM Microsoft 365 Business Customer Targeting Janine Brittain - EXEED 2/6/18 © Microsoft Corporation. All rights reserved. MICROSOFT.
Check Point Connectra NGX R60
Virtual Private Network
Cloud Video Interop for Microsoft Teams
Increase and Improve your PC management with Windows Intune
Cloud Video Interop for Microsoft Teams
Cloud Computing LegalRun Solutions Why It’s Right for You!
Presentation transcript:

[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette Sultan

2 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. We listened to you Customer advisory board 50 interviews Both enterprises and SMBs

3 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. pressure to keep things simple, manageable pressure to reduce TCO changing business environment evolving threats security infrastructure Torn in multiple directions

4 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. The obvious feedback my business #1 you want to be secure

5 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. You want Freedom to add protections as you need them

6 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… WITHOUT HAVING TO: worry about performance issues, worry availability issues

7 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… WITHOUT HAVING TO: pay for them before you actually need them

8 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… pay for another full solution, instead of leveraging existing infrastructure WITHOUT HAVING TO:

9 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… take on board yet another vendor with yet another point solution WITHOUT HAVING TO:

10 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved.

11 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. You want to SCALE UP CONSOLIDATE MIGRATE MOVE THINGS AROUND CHANGE OPTIMIZE RE-ALLOCATE

12 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to rethink the architecture for every single vendor WITHOUT HAVING TO:

13 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to change your people organization because technology requires you WITHOUT HAVING TO:

14 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to Worry that you might compromise security in the process WITHOUT HAVING TO:

15 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved.

16 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. You want to stay in control Keep the solution simple Without the need to compromise security now… …or give up on future flexibility

17 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. What the customer wants totalsecurity flexiblesecurity simplesecurity Total security across all enforcement points Simple deployment, upgrade, management and business model To pick the right building blocks, at the right time with the right performance

18 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved provides flexibility and further simplicity GatewayEndpointManagement softwareblades from Check Point totalsecurity from Check Point

19 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A software blade is a security building block

20 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. How does it work? Select a containerSelect the bladesConfigure the system

21 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Two options to construct your solution Option 1: A La Carte Option 2: Pre-Defined Systems* SG103 1 core 3 blades SG407 4 cores 7 blades SG805 8 cores 5 blades *Examples

22 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Custom configuration Medium businessEnterprise 10,000s of users 100s of offices Many applications 100s of users 10s of offices Few applications

23 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Many customers do not turn on IPS due to performance concerns Check Point enables full IPS utilization 1. Activate IPS blade 2. Activate Acceleration blade 3. Set guaranteed performance levels Performance Example: The performance to use full IPS

24 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A library of software blades NETWORKMANAGEMENTENDPOINT

25 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. With software blades – new functionality Extend your existing security infrastructure IPS VoIP Acceleration Provisioning IPS Event Analysis

26 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business

27 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores)

28 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores) More branches and mobile users: VPN $1,500

29 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores) More branches and mobile users: VPN $1,500 Congested internet connection Acceleration 1,500

30 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores) More branches and mobile users: VPN $1,500 Congested internet connection Acceleration $1,500 Threat of targeted attacks IPS $3,000

31 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: consolidation

32 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. IPS Firewall A scenario: consolidation Firewall Internet Firewall AV Web Security Firewall VPN Branch HQ Branch VPN IPS VPN AV Web Security AV Anti-spam Advance Networking Acceleration IPS

33 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. HQ SG805 A scenario: consolidation Branch SG207 Branch SG407 Internet Branch UTM Branch SG106

34 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Your choice softwareblades from Check Pointmultiple point solutions / vendors multiple projects dedicated hardware dedicated management one project multiple configurations single management lower investment lower TCO

35 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. softwareblades from Check Point SecureFlexibleSimple

[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Thank you