Download presentation
Presentation is loading. Please wait.
Published byCharles Phelps Modified over 8 years ago
1
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013 Elif Günaydın
2
2 2©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point in 2012 NSS Labs 2 2 Gartner Magic Quadrants 3 3
3
3 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Financial Performance Market Value 10.36 Billion $ Market Value 10.36 Billion $
4
4 4©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | The New Face of Next Generation Firewall
5
5 5©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point’s Next Generation Firewall Discover and block threats in real time Secure use of Web 2.0 tools and data Comprehensive understanding of security events Look beyond IP—define security by user identity
6
6 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Context-based Security Consolidated on the Security Gateway DLP Software Blade Application Control Software Blade IPS Software Blade Firewall and VPN Software Blades URL Filtering Software Blade Antivirus & Anti-Malware Software Blade Identity Awareness Software Blade Anti-Bot Software Blade Check Point’s Next Generation Firewall
7
7 7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 114 SPU 114 SPU 374 SPU 623 SPU 738 SPU 1046 SPU 1861 SPU 2900 SPU 22004200440048001220012400126002140021600 3300 SPU 3x performance3x performance Security Accelerator ModuleSecurity Accelerator Module New high-end platformNew high-end platform Single OS: GAiASingle OS: GAiA Security Appliances 14,600 SPU 2012 61000
8
8 8©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 3551 SPU 114 SPU 114 SPU 374 SPU 623 SPU 738 SPU 1046 SPU 1861 SPU 2900 SPU 22004200440048001220012400126002140021600 3300 SPU Security Appliances 14,600 SPU 61000 2012 Expand real-world performanceExpand real-world performance Raise the bar at super high endRaise the bar at super high end 21700
9
9 9©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Security Appliances Full range of Security small / branch appliances to high end enterprise 61000 2200420044004800 214002170021600 122001240012600 1100
10
10 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
11
11 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Multiple sources of data SensorNet 3D Reports Threat Cloud
12
12 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | A comprehensive survey 888companies 1,494gateways 120,000Monitoring hours 112,000,000security events
13
13 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | A comprehensive survey % of companies Americas EMEA APAC Industrial Finance Government Telco Consulting Other By geographyBy sector
14
14 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | The majority of companies are infected 63% 100% = 888 companies of the organizations in the research were infected with bots
15
15 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Once in … always on Communicating with command & control every 21 minutes
16
16 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Downloading malware all the time 53% of organizations saw malware downloads
17
17 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Most attacks originate in the US Top malware locations, % US 71% Canada 8% Czech Rep 2% Slovakia 2% France 2% UK 2% Germany 2% Israel 3% Turkey 3% China 3%
18
18 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Anonymizers inside the corporation 43%43% of organizations had users of Anonymizers (80% were not aware that their employees use Anonymizers) 100% = 888 companies
19
19 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | P2P inside the corporation 61% of organizations had a P2P file sharing app in use 100% = 888 companies
20
20 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | How common is it? 54% of organizations experienced data loss
21
21 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Many types of data leaked 24% Source Code 7% Email marked as confidential 14% Password protected file 29% Credit card information 13% Salary compensation information 7% Bank accounts numbers 6% Business data record 21% Other
22
22 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | PCI compliance can be improved36% Of financial organizations sent credit card data outside the organization
23
23 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
24
24 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 2012 Awards
25
25 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point 2012 NSS Labs 2 2 Gartner Magic Quadrants 3 3
26
26 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | NSS Labs – Tested Appliances CheckPoint 12600 Dell SonicWALL SuperMassive E10800 Fortinet FortiGate 3600C Juniper SRX 3600 Palo Alto PA-5020 Sourcefire 8250 Sourcefire 8290 Stonesoft 3202 WatchGuard XTM 2050
27
27 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Top Scores with Triple Recommend NGFW 98.5% Management and Security Effectiveness 2013 NGFW Group Test Firewall 100% Management and Security Effectiveness 2013 Firewall Group Test IPS 99.0% Overall Protection Product Analysis Report
28
28 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Top Score for NGFW with NSS Labs 98.5% Highest overall score 99.2% Blocked server application attacks 97.7% Blocked client applications attacks “Recommend” 2013 NGFW Group Test 98.5% NGFW Enterprise Management and Security Effectiveness CHECK POINT CONTINUES NGFW LEADERSHIP WITH RECOMMEND RATING
29
29 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | NSS Labs 2013 NGFW Security Value Map (SVM) Security Value Map NSS Labs 2013 NGFW Group Test Check Point is the NGFW Leader with the Highest “Enterprise management and security Effectiveness”
30
30 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 3 years TCO
31
31 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | A Perfect Score in Firewall Tests 100% Score in All Firewall Test Areas Outstanding performance while maintaining low TCO ($11.72 per protected Mbps) “Recommend” 2013 Firewall Group Test 100% Enterprise Management and Security Effectiveness LONG STANDING RECORD OF EXCELLENCE AFFIRMED BY FIREWALL TEST RESULTS
32
32 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Best IPS Overall Protection 99.0% Overall protection score 100% Resistance to Evasion Excellent Stability and Reliability Management comes through again, powerful and easy-to-use “Recommend” rating 99.0% Overall Protection Check Point 61000 IPS SETTING THE STANDARD IN OVERALL PROTECTION FOR IPS
33
33 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Highest Security Effectiveness The security effectiveness of the IPS component of the NGFW can be seen in the following table as we factor in evasions and leakage to the exploit block rate. Check Point is the leader NGFW with 100% immunity to Evasions and Leakage
34
34 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Summary [Protected] Non-confidential content TRIPLE RECOMMEND RATINGS WITH TOP SCORES IN LATEST NSS LABS TESTS 98.5% NGFW Management and Security Effectiveness 2013 NGFW Group Test 100% Firewall Management and Security Effectiveness 2013 Firewall Group Test 99.0% IPS Overall Protection Product Analysis Report
35
35 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Ajanda 1 1 Check Point 2012 NSS Labs 2 2 Gartner Magic Quadrants 3 3
36
36 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Competitors – Firewall ASA Serisi SRX Serisi FortiGate PA
37
37 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Magic Quadrant for Enterprise Network Firewalls, 2013. LEADER
38
38 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Competitors - UTM UTM (Astaro) Serisi XTM Serisi FortiGate NSA
39
39 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Magic Quadrant for Unified Threat Management (UTM), 2012 LEADER
40
40 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | What’s new in 2013? Smartlog SmartEvent Compliance DDoS Protector 1100
41
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.