Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014.

Similar presentations


Presentation on theme: "©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014."— Presentation transcript:

1 ©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014 Check Point Software Technologies Ltd Security Engineer, UK Sunny Gill Check Point Corporate Overview

2 ©2014 Check Point Software Technologies Ltd. 2 [Restricted] ONLY for designated groups and individuals The Future Can Be Amazing… When You Are Secure ©2014 Check Point Software Technologies Ltd. 2

3 ©2014 Check Point Software Technologies Ltd. 3 [Restricted] ONLY for designated groups and individuals Accelerating Rise of Malware The Security Landscape 25 Years Ago: Invention of Firewall 20 Years Ago: Invention of Stateful Inspection 10 Years Ago: URL Filtering, UTM 5 Years Ago: NGFW, Mobile Security Now: Threat Intelligence Threat Prevention 15 Years Ago: Prevalent use of Antivirus, VPN, IPS 2010: DDoS attacks: Stuxnet SCADA 1988: Morris Worm 1994: Green Card Lottery 2000: I Love You 2003: Anonymous Formed 2012: Flame Malware 2017: Driverless Cars Hacked? 2006: WikiLeaks 2013: Dragonfly 2011: Stolen authentication information 2014: Bitcoin 2020: IoT Everywhere 1998: Melissa 2007: Zeus Trojan

4 ©2014 Check Point Software Technologies Ltd. 4 [Restricted] ONLY for designated groups and individuals Nations Corporate Networks Hacker GroupsIndividual Individual End User ATTACKER IoT and Strategic Infrastructure Billions Millions Thousands Threats are Growing

5 ©2014 Check Point Software Technologies Ltd. 5 [Restricted] ONLY for designated groups and individuals Evolving and Complex Attacks: A Real Example SOCIAL ENGINEERING TARGETED DELI SITE COMPANY COMPUTERS INFECTED

6 ©2014 Check Point Software Technologies Ltd. 6 [Restricted] ONLY for designated groups and individuals Check Point Security Next Generation Network Security Next Generation Threat Prevention Mobile Security Virtualized / Cloud Security

7 ©2014 Check Point Software Technologies Ltd. 7 [Restricted] ONLY for designated groups and individuals Check Point Security Built on a comprehensive Software-defined Protection (SDP) Architecture ENFORCEMENT LAYER Inspects traffic and enforces protection in well-defined segments CONTROL LAYER Delivers real-time protections to the enforcement points MANAGEMENT LAYER Integrates security with business process

8 ©2014 Check Point Software Technologies Ltd. 8 [Restricted] ONLY for designated groups and individuals Unified Management Best ROI for Management Customized Visibility Unified Policy Everywhere Monitoring

9 ©2014 Check Point Software Technologies Ltd. 9 What about visibility? Using different IP addresses Using different protocols Using different URLs Using different applications 200,000 SECURITY LOGS

10 ©2014 Check Point Software Technologies Ltd. 10 Business Terminology … TURN DATA INTO SECURITY INFORMATION SIMPLE, MEANINGFUL INSIGHTS TURN DATA INTO SECURITY INFORMATION SIMPLE, MEANINGFUL INSIGHTS [Confidential] For designated groups and individuals

11 ©2014 Check Point Software Technologies Ltd. 11 360º Visibility into Application Usage Events [Confidential] For designated groups and individuals

12 ©2014 Check Point Software Technologies Ltd. 12 12 What’s Hogging The Bandwidth? Facebook – 469MB [Confidential] For designated groups and individuals

13 ©2014 Check Point Software Technologies Ltd. 13 [Restricted] ONLY for designated groups and individuals 360 o Visibility of Network Security [Confidential] For designated groups and individuals Time shows topline security events Map shows origin of attacks and threats Rate and frequency of potential attacks Important security events highlighted

14 ©2014 Check Point Software Technologies Ltd. 14 [Restricted] ONLY for designated groups and individuals

15 ©2014 Check Point Software Technologies Ltd. 15 [Restricted] ONLY for designated groups and individuals

16 ©2014 Check Point Software Technologies Ltd. 16 NEXT GENERATION Smart Event Check Point Introduces… Effective and Customized Visibility Everywhere Monitoring for all Security Threats Big Data Threat Detection in Seconds

17 ©2014 Check Point Software Technologies Ltd. 17 C-Level Executives Hosts by Malicious Activity Monthly Security Trends Employees’ Online Behavior Security Administrators Customized Visibility Tailored for Your Diverse Needs Department Managers

18 ©2014 Check Point Software Technologies Ltd. 18 Access Denied X X X X Remote Access Correlations Identify Suspicious Activities Multiple Locations SAME Credentials Timeline View 1

19 ©2014 Check Point Software Technologies Ltd. 19 [Restricted] ONLY for designated groups and individuals Market Leadership #1 in FW/UTM Appliance Market Share* A Leader in the Gartner Magic Quadrants**: Enterprise Network Firewalls Unified Threat Management Mobile Data Protection Highest IPS Score * Check Point leads in worldwide combined firewall and UTM appliance revenue for full-year 2013 and 1H 2014, according to IDC’s Worldwide Security Appliance Tracker **Gartner, Inc., Magic Quadrant for Enterprise Network Firewalls, Greg Young, Adam Hils, Jeremy D'Hoinne, 15 April 2014; Gartner, Inc., Magic Quadrant for Unified Threat Management, Jeremy D’Hoinne, Adam Hils, Greg Young, 07 August 2014; Gartner, Inc., Magic Quadrant for Mobile Data Protection, John Girard, 08 September 2014. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

20 ©2014 Check Point Software Technologies Ltd. 20 [Restricted] ONLY for designated groups and individuals Our Culture, Employees and Go-to-Market is our Strength More than 100,000 Customers 200 Technology Partners 88+ Countries 6,000+ Channel Partners 3,000 Employees Check Point has long-term relationships with customers and partners

21 ©2014 Check Point Software Technologies Ltd. 21 [Restricted] ONLY for designated groups and individuals Helping Secure You ThreatCloud Emulation Service Security Policy Compliance Performance Sizing Utility Security Checkup Cloud Service

22 ©2014 Check Point Software Technologies Ltd. 22 [Restricted] ONLY for designated groups and individuals Product Highlights

23 ©2014 Check Point Software Technologies Ltd. 23 [Restricted] ONLY for designated groups and individuals Check Point Development Timeline Firewall Stateful Packet Inspection VPN VE UTM Software Blades IPS ID Awareness App Control DLP & MAB Gaia Next Gen Appliances Anti-Bot URLf HTTPSi Threat Emulation Compliance Capsule Next Gen Smart Event Next Gen Management* vSEC SandBlast MTP More to come… *Subject to change

24 ©2014 Check Point Software Technologies Ltd. 24 [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 24 [Restricted] ONLY for designated groups and individuals Establishes a secure business environment on mobile devices Secures your documents everywhere they go Protects devices from threats everywhere Protect mobile devices from rogue Apps that steals your data SEAMLESS security for everywhere you go

25 ©2015 Check Point Software Technologies Ltd. 25 Sandblast: Threat Emulation & Threat Extraction [Restricted] ONLY for designated groups and individuals Zero malware documents delivered in zero seconds Threat Extraction Threat Emulation Threat Extraction Visibility on attack attempts and inspection of original documents

26 ©2015 Check Point Software Technologies Ltd. 26 Stop undiscovered attacks with Check Point SandBlast INSPECT FILE EMULATE PREVENT SHARE [Restricted] ONLY for designated groups and individuals

27 ©2015 Check Point Software Technologies Ltd. 27 For Every Evasion There’s an Anti-Evasion Malware goes to sleep Sandbox accelerates the clock Malware implements its own clock … Malware looks for a Sandbox Sandbox emulate a CPU to hide itself Malware identifies the CPU emulator … Malware looks for a human Sandbox imitates human behavior Malware detects a “virtual human” …

28 ©2015 Check Point Software Technologies Ltd. 28 Detect Where There is No Place to Hide Vulnerability Exploit Malware Shellcode Identify the Exploit Before the attacker had a chance to use evasion techniques Only a handful of exploit methods to keep up with

29 ©2015 Check Point Software Technologies Ltd. 29 CPU-Level Sandbox Technology EXPLOIT Look for the EXPLOIT Monitor the OS and look for abnormal activity Monitor the CPU instructions flow and look for exploit patterns

30 ©2015 Check Point Software Technologies Ltd. 30 The Challenge [Protected] Non-confidential content embedded objects & macros Attackers use embedded objects & macros to inject malware to organization

31 ©2015 Check Point Software Technologies Ltd. 31 Risk-Based Profile Reconstruction Options [Restricted] ONLY for designated groups and individuals Convert to PDF Keep original format Remove content that can be exploited

32 ©2015 Check Point Software Technologies Ltd. 32 What elements can be controlled? [Restricted] ONLY for designated groups and individuals

33 ©2015 Check Point Software Technologies Ltd. 33 How Threat Extraction Works: Inspected by Gateway Attachment Potential malicious content is dropped clean Attachment passed to the end-user Educate user & allow access to original file (if required…) [Protected] Non-confidential content

34 ©2015 Check Point Software Technologies Ltd. 34 Zero Malware Documents THREAT EXTRACTION CHECK POINT THREAT EXTRACTION Original Document Document Reconstructed Zero Malware Document

35 ©2014 Check Point Software Technologies Ltd. 35 Email a document to: threats@checkpoint.com Try it Yourself! THREAT EMULATION & THREAT EXTRACTION Try it Yourself! Upload a file to: threatemulation.checkpoint.com

36 ©2014 Check Point Software Technologies Ltd. 36 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014 Check Point Software Technologies Ltd Thank You


Download ppt "©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014."

Similar presentations


Ads by Google