Download presentation
Presentation is loading. Please wait.
Published byLuke Tate Modified over 8 years ago
1
©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014 Check Point Software Technologies Ltd Security Engineer, UK Sunny Gill Check Point Corporate Overview
2
©2014 Check Point Software Technologies Ltd. 2 [Restricted] ONLY for designated groups and individuals The Future Can Be Amazing… When You Are Secure ©2014 Check Point Software Technologies Ltd. 2
3
©2014 Check Point Software Technologies Ltd. 3 [Restricted] ONLY for designated groups and individuals Accelerating Rise of Malware The Security Landscape 25 Years Ago: Invention of Firewall 20 Years Ago: Invention of Stateful Inspection 10 Years Ago: URL Filtering, UTM 5 Years Ago: NGFW, Mobile Security Now: Threat Intelligence Threat Prevention 15 Years Ago: Prevalent use of Antivirus, VPN, IPS 2010: DDoS attacks: Stuxnet SCADA 1988: Morris Worm 1994: Green Card Lottery 2000: I Love You 2003: Anonymous Formed 2012: Flame Malware 2017: Driverless Cars Hacked? 2006: WikiLeaks 2013: Dragonfly 2011: Stolen authentication information 2014: Bitcoin 2020: IoT Everywhere 1998: Melissa 2007: Zeus Trojan
4
©2014 Check Point Software Technologies Ltd. 4 [Restricted] ONLY for designated groups and individuals Nations Corporate Networks Hacker GroupsIndividual Individual End User ATTACKER IoT and Strategic Infrastructure Billions Millions Thousands Threats are Growing
5
©2014 Check Point Software Technologies Ltd. 5 [Restricted] ONLY for designated groups and individuals Evolving and Complex Attacks: A Real Example SOCIAL ENGINEERING TARGETED DELI SITE COMPANY COMPUTERS INFECTED
6
©2014 Check Point Software Technologies Ltd. 6 [Restricted] ONLY for designated groups and individuals Check Point Security Next Generation Network Security Next Generation Threat Prevention Mobile Security Virtualized / Cloud Security
7
©2014 Check Point Software Technologies Ltd. 7 [Restricted] ONLY for designated groups and individuals Check Point Security Built on a comprehensive Software-defined Protection (SDP) Architecture ENFORCEMENT LAYER Inspects traffic and enforces protection in well-defined segments CONTROL LAYER Delivers real-time protections to the enforcement points MANAGEMENT LAYER Integrates security with business process
8
©2014 Check Point Software Technologies Ltd. 8 [Restricted] ONLY for designated groups and individuals Unified Management Best ROI for Management Customized Visibility Unified Policy Everywhere Monitoring
9
©2014 Check Point Software Technologies Ltd. 9 What about visibility? Using different IP addresses Using different protocols Using different URLs Using different applications 200,000 SECURITY LOGS
10
©2014 Check Point Software Technologies Ltd. 10 Business Terminology … TURN DATA INTO SECURITY INFORMATION SIMPLE, MEANINGFUL INSIGHTS TURN DATA INTO SECURITY INFORMATION SIMPLE, MEANINGFUL INSIGHTS [Confidential] For designated groups and individuals
11
©2014 Check Point Software Technologies Ltd. 11 360º Visibility into Application Usage Events [Confidential] For designated groups and individuals
12
©2014 Check Point Software Technologies Ltd. 12 12 What’s Hogging The Bandwidth? Facebook – 469MB [Confidential] For designated groups and individuals
13
©2014 Check Point Software Technologies Ltd. 13 [Restricted] ONLY for designated groups and individuals 360 o Visibility of Network Security [Confidential] For designated groups and individuals Time shows topline security events Map shows origin of attacks and threats Rate and frequency of potential attacks Important security events highlighted
14
©2014 Check Point Software Technologies Ltd. 14 [Restricted] ONLY for designated groups and individuals
15
©2014 Check Point Software Technologies Ltd. 15 [Restricted] ONLY for designated groups and individuals
16
©2014 Check Point Software Technologies Ltd. 16 NEXT GENERATION Smart Event Check Point Introduces… Effective and Customized Visibility Everywhere Monitoring for all Security Threats Big Data Threat Detection in Seconds
17
©2014 Check Point Software Technologies Ltd. 17 C-Level Executives Hosts by Malicious Activity Monthly Security Trends Employees’ Online Behavior Security Administrators Customized Visibility Tailored for Your Diverse Needs Department Managers
18
©2014 Check Point Software Technologies Ltd. 18 Access Denied X X X X Remote Access Correlations Identify Suspicious Activities Multiple Locations SAME Credentials Timeline View 1
19
©2014 Check Point Software Technologies Ltd. 19 [Restricted] ONLY for designated groups and individuals Market Leadership #1 in FW/UTM Appliance Market Share* A Leader in the Gartner Magic Quadrants**: Enterprise Network Firewalls Unified Threat Management Mobile Data Protection Highest IPS Score * Check Point leads in worldwide combined firewall and UTM appliance revenue for full-year 2013 and 1H 2014, according to IDC’s Worldwide Security Appliance Tracker **Gartner, Inc., Magic Quadrant for Enterprise Network Firewalls, Greg Young, Adam Hils, Jeremy D'Hoinne, 15 April 2014; Gartner, Inc., Magic Quadrant for Unified Threat Management, Jeremy D’Hoinne, Adam Hils, Greg Young, 07 August 2014; Gartner, Inc., Magic Quadrant for Mobile Data Protection, John Girard, 08 September 2014. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
20
©2014 Check Point Software Technologies Ltd. 20 [Restricted] ONLY for designated groups and individuals Our Culture, Employees and Go-to-Market is our Strength More than 100,000 Customers 200 Technology Partners 88+ Countries 6,000+ Channel Partners 3,000 Employees Check Point has long-term relationships with customers and partners
21
©2014 Check Point Software Technologies Ltd. 21 [Restricted] ONLY for designated groups and individuals Helping Secure You ThreatCloud Emulation Service Security Policy Compliance Performance Sizing Utility Security Checkup Cloud Service
22
©2014 Check Point Software Technologies Ltd. 22 [Restricted] ONLY for designated groups and individuals Product Highlights
23
©2014 Check Point Software Technologies Ltd. 23 [Restricted] ONLY for designated groups and individuals Check Point Development Timeline Firewall Stateful Packet Inspection VPN VE UTM Software Blades IPS ID Awareness App Control DLP & MAB Gaia Next Gen Appliances Anti-Bot URLf HTTPSi Threat Emulation Compliance Capsule Next Gen Smart Event Next Gen Management* vSEC SandBlast MTP More to come… *Subject to change
24
©2014 Check Point Software Technologies Ltd. 24 [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 24 [Restricted] ONLY for designated groups and individuals Establishes a secure business environment on mobile devices Secures your documents everywhere they go Protects devices from threats everywhere Protect mobile devices from rogue Apps that steals your data SEAMLESS security for everywhere you go
25
©2015 Check Point Software Technologies Ltd. 25 Sandblast: Threat Emulation & Threat Extraction [Restricted] ONLY for designated groups and individuals Zero malware documents delivered in zero seconds Threat Extraction Threat Emulation Threat Extraction Visibility on attack attempts and inspection of original documents
26
©2015 Check Point Software Technologies Ltd. 26 Stop undiscovered attacks with Check Point SandBlast INSPECT FILE EMULATE PREVENT SHARE [Restricted] ONLY for designated groups and individuals
27
©2015 Check Point Software Technologies Ltd. 27 For Every Evasion There’s an Anti-Evasion Malware goes to sleep Sandbox accelerates the clock Malware implements its own clock … Malware looks for a Sandbox Sandbox emulate a CPU to hide itself Malware identifies the CPU emulator … Malware looks for a human Sandbox imitates human behavior Malware detects a “virtual human” …
28
©2015 Check Point Software Technologies Ltd. 28 Detect Where There is No Place to Hide Vulnerability Exploit Malware Shellcode Identify the Exploit Before the attacker had a chance to use evasion techniques Only a handful of exploit methods to keep up with
29
©2015 Check Point Software Technologies Ltd. 29 CPU-Level Sandbox Technology EXPLOIT Look for the EXPLOIT Monitor the OS and look for abnormal activity Monitor the CPU instructions flow and look for exploit patterns
30
©2015 Check Point Software Technologies Ltd. 30 The Challenge [Protected] Non-confidential content embedded objects & macros Attackers use embedded objects & macros to inject malware to organization
31
©2015 Check Point Software Technologies Ltd. 31 Risk-Based Profile Reconstruction Options [Restricted] ONLY for designated groups and individuals Convert to PDF Keep original format Remove content that can be exploited
32
©2015 Check Point Software Technologies Ltd. 32 What elements can be controlled? [Restricted] ONLY for designated groups and individuals
33
©2015 Check Point Software Technologies Ltd. 33 How Threat Extraction Works: Inspected by Gateway Attachment Potential malicious content is dropped clean Attachment passed to the end-user Educate user & allow access to original file (if required…) [Protected] Non-confidential content
34
©2015 Check Point Software Technologies Ltd. 34 Zero Malware Documents THREAT EXTRACTION CHECK POINT THREAT EXTRACTION Original Document Document Reconstructed Zero Malware Document
35
©2014 Check Point Software Technologies Ltd. 35 Email a document to: threats@checkpoint.com Try it Yourself! THREAT EMULATION & THREAT EXTRACTION Try it Yourself! Upload a file to: threatemulation.checkpoint.com
36
©2014 Check Point Software Technologies Ltd. 36 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014 Check Point Software Technologies Ltd Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.