Download presentation
Presentation is loading. Please wait.
Published byIrma Bell Modified over 7 years ago
1
Check Point vSEC STORY [Protected] Non-confidential content
2
The Problem Of Creating New Services
Business Need Time to market is crutial - driven by customer needs , costs sensetive Served by Aplications Flexible adoptable to Business needs, fast evolution , Inovation is the key Served by Infrastructure Needs to be stable and reliant , current aproach = one layout fits all. Business Expectations Exceed Legacy Datacenter Capabilities [Confidential] For designated groups and individuals
3
[Confidential] For designated groups and individuals
HYBRID CLOUD ALLOWS IT TO DELIVER APPLICATIONS IN A FRACTION OF COST AND TIME! [Confidential] For designated groups and individuals
4
[Confidential] For designated groups and individuals
LEGACY SECURITY IS A SHOWSTOPPER, AND DOESN’T PROTECT APPLICATIONS FROM MODERN THREATS [Confidential] For designated groups and individuals
5
SECURITY IN THE HYBRID CLOUD….
Must prevent lateral move of threats between applications and not only at the perimeter Should protect new IT services and applications in seconds not in weeks Should automatically be provisioned and scale within the environment without operational overhead [Confidential] For designated groups and individuals
6
INSTANTLY SECURE RAPIDLY-EVOLVING SERVICES
IN ALL HYBRID CLOUD ENVIRONMENTS WITH PAY-AS-YOU-GO VIRTUAL SECURITY [Confidential] For designated groups and individuals
7
[Confidential] For designated groups and individuals
SECURE YOUR MODERN DATACENTER WITH AUTOMATION AND TIGHT SECURITY BETWEEN APPLICATIONS [Confidential] For designated groups and individuals
8
[Confidential] For designated groups and individuals
vSEC SECURES YOUR APPLICATIONS EVERYWHERE [Confidential] For designated groups and individuals
9
PREVENT LATERAL THREATS BETWEEN APPLICATIONS
CISCO ACI Tightly integrate with leading SDN Datacenter vSEC Inspects East-West traffic between physical and virtual machines with Sandblast Advanced Threat Prevention [Confidential] For designated groups and individuals
10
[Confidential] For designated groups and individuals
SECURE YOUR APPLICATIONS IN THE HYBRID CLOUD vSEC for AWS Extend your vSEC Security to your Public IaaS PUBLIC IaaS vSEC for Azure PRIVATE CLOUD vSEC for vCloud Air [Confidential] For designated groups and individuals
11
[Confidential] For designated groups and individuals
FROM WEEKS TO SECONDS WITH vSEC AUTOMATION [Confidential] For designated groups and individuals
12
vSEC SECURITY AUTOMATION USE CASES
PERFORM THESE OPERATIONS… Security is automatically provisioned Application is instantly secured Application admin never waits No tickets overhead Everything is auditable KNOWING THAT…. Change application’s networking Scale up your application Virtual Patching Provision a new application Connect a new IOT device [Confidential] For designated groups and individuals
13
CHANGE APPLICATION NETWORKING
Legacy Way Many Days / Manual process App owner opens ticket to FW Admin to change policy FW admin changes the policy New policy is published on the weekend Changing Web VM IP Seconds / Dynamic Process vSEC dynamically learns about this change from vCenter and all virtual and physical GWs are instantly updated vSEC Way [Confidential] For designated groups and individuals
14
SCALE UP YOUR APPLICATION
Many Days / Manual process Open ticket to FW Admin to change policy FW admin changes the policy New policy is published on the weekend Legacy Way Add a new Web VM cluster vSEC dynamically learn about the change and instantly update GW policy Seconds / Dynamic Process VM is automatically added to web SDN Group vSEC Way [Confidential] For designated groups and individuals
15
[Confidential] For designated groups and individuals
VIRTUAL PATCHING Virtually patch your applications with vSEC IPS and advanced threat prevention before security patch is announced vSEC Way Legacy Way It takes days to test, approve and deploy a new security patch Meanwhile, vulnerability is known and applications are exposed [Confidential] For designated groups and individuals
16
PROVISION A NEW APPLICATION
Many hours / Manual process Develop a manual procedure for new Database Manually configure the FW to secure the new Database Legacy Way Develop an orchestration recipe for new Database with security Seconds / Automation Process Recipe is executed and provision the FW policy vSEC Way [Confidential] For designated groups and individuals
17
CONNECT A NEW IOT DEVICE
vSEC Portal for IOT Admin Enter the new IOT name Add Connect IOT to the network New rule is created to IOT and all GWs are instantly updated 30 Secs Manual (avoid open a ticket) Seconds / Automation Process vSEC Way [Confidential] For designated groups and individuals
18
[Confidential] For designated groups and individuals
5 REASONS WHY vSEC R80 IS THE BEST SECURITY AUTOMATION SOLUTION [Confidential] For designated groups and individuals
19
[Confidential] For designated groups and individuals
1st REASON Check Point vSEC & R80 Other Vendors Trusted Policy Delegation Scope automation privileges only to relevant application’s rules Giving the keys for the kingdom If you allow automation to change one rule, you allow it change any rule [Confidential] For designated groups and individuals
20
[Confidential] For designated groups and individuals
2nd REASON Check Point vSEC & R80 Other Vendors Simultaneous updates Many automations can run simultaneously Entire Policy Lockdown Only one automation can run at a time [Confidential] For designated groups and individuals
21
[Confidential] For designated groups and individuals
3rd REASON Check Point vSEC & R80 Other Vendors Dynamic Changes Gateways policy dynamically learns about network changes of VMs & Applications Static Changes Admin must manually update policy anytime VM networking is changed [Confidential] For designated groups and individuals
22
[Confidential] For designated groups and individuals
4th REASON (roadmap) Check Point vSEC & R80 Other Vendors Auto security service chaining vSEC automatically configures SDN controller to chain security based on policy Manual security service chaining SDN Admin must manually configure the controller policy to chain security [Confidential] For designated groups and individuals
23
[Confidential] For designated groups and individuals
5th REASON (roadmap) Check Point vSEC & R80 Other Vendors Application role Auto-Discovery Admin is educated on what policy to apply between VMs Security role manual discovery Admin is oblivious on what security policy to apply between VMs [Confidential] For designated groups and individuals
24
[Confidential] For designated groups and individuals
THE JOURNEY TO HYBRID CLOUD STARTED BE RELEVANT STAY COMPETITIVE [Confidential] For designated groups and individuals
25
120K 100+ 7200+ ACI-ready customers
HYBRID CLOUD & SDN TIPPING POINT (July 2016) AZURE 120K New customers/month VMware NSX 100+ Customers spent over $1M on NSX Cisco ACI ACI-ready customers [Confidential] For designated groups and individuals
26
SECURITY MUST PAVE THE WAY OF THIS JOURNEY
THE EFFORT OF HYBRID CLOUD MOVING TO CLOUD IS A STRATEGIC MOVE IT TAKES TIME AND EFFORT TO REALIZE THE FULL POTENTIAL Phase #1: New Infrastructure Compute (Hypervisor) SDN (Network) Phase #2: New Applications Software Defined Applications Phase #3: New Operation DevOps & Orchestration SECURITY MUST PAVE THE WAY OF THIS JOURNEY [Confidential] For designated groups and individuals
27
[Confidential] For designated groups and individuals
vSEC SECURES THE FUTURE DATACENTER TODAY [Confidential] For designated groups and individuals
28
[Confidential] For designated groups and individuals
vSEC SOLUTIONS & PRODUCTS vSEC for Private Cloud with SDN vSEC for NSX vSEC for ACI vSEC for Virtual-Datacenter vSEC Virtual Edition (also known as VE) vSEC for OpenStack vSEC for Public IaaS vSEC for AWS vSEC for AZURE vSEC for vCloud Air [Confidential] For designated groups and individuals
29
Advanced Security for Hybrid Cloud Unified Security Control
SUMMARY: Advanced Security for Hybrid Cloud PUBLIC CLOUD PRIVATE Unified Security Control &Visibility Security Automation SECURITY THAT TAKES YOUR MODERN DATACENTER ONE STEP AHEAD [Restricted] ONLY for designated groups and individuals
30
THANK YOU [Protected] Non-confidential content
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.