Download presentation
Presentation is loading. Please wait.
Published byPhoebe Fletcher Modified over 7 years ago
1
Predrag Spasic | Sales Manager Serbia and Macedonia
Prevencija, ne detekcija Check point resenja Predrag Spasic | Sales Manager Serbia and Macedonia [Restricted] for designated teams
2
[Restricted] for designated teams
3
NSS labs- Check Point’s track record of security leadership and excellence!
IPS Recommended – Nov 2013 100% Management score and Best annual Management Labor Cost (Upkeep and Tuning)! NGFW Recommended – Sept 2014 4th NGFW Recommended NGFW Recommended – Feb 2013 Best Security + Management Score of 98.5%! BDS Recommended – Aug 2015 1st time tested , 100% unknown malware catch-rate IPS Individual Test – Feb 2013* 61000 IPS Security Score of 99%! G IPS NGFW Recommended – Mar 2016 99.8% Catch rate and 5th NSS NGFW Recommended! FW Recommended – Jan 2013 Best Security + Management score of 100%! IPS Recommended – July 2012 Leading integrated IPS Security Score of 98.7%! NGFW Recommended – Jan 2012 Continued NGFW Leadership and Excellence! Here is the complete record of our NSS Labs test participation. You can see in each instance we received NSS Labs’ highest award, NSS Recommended. In fact Check Point has received nine NSS Recommended awards since Every FW, IPS and NGFW test we’ve participated in, we’ve received NSS Recommended. Plus we conducted one Individual IPS test where we scored 99% Security Score – but NSS only grant “Recommended” as part of Group Tests – this was an Individual test on our appliance. Overall a truly exceptional record – that should help give you confidence in the quality of our products and the security we deliver – over the long term. FW Recommended – April 2011 Only vendor to pass the initial test! NGFW Recommended – April 2011 World’s first NSS Recommended NGFW! Individual product test and not part of a Group Test. NSS only awards “Recommended” in Group Tests. IPS Recommended – Jan 2011 Best integrated IPS Security Score of 97.3%!
4
NSS LABS: CHECK POINT THE ONLY VENDOR WITH CONSISTENT “RECOMMENDED” RATING
* 4 ©2016 Check Point Software Technologies Ltd. Source: NSS Labs * WAF & EPP not calculated
5
Check Point Sandblast Recommended for Security Effectiveness and Value
100% HTTP Malware 100% SMB Malware 100% Malware 100% Drive-by-Exploits (only vendor) 97.2% Detection Rate Fastest solution (7Gbps) Lowest TCO ©2016 Check Point Software Technologies Ltd.
6
GATEWAY BLADES - OVERVIEW
Identity Awareness URL filtering Application Control Anti-virus Security Gateway blades IPS Anti-bot Threat Emulation Threat Extraction Mobile access DLP Anti-spam [Restricted] for designated teams
7
MANAGEMENT BLADES - OVERVIEW
SmartLog Management blades SmartEvent Workflow Monitoring Compliance Osnovna prednost Check Point resenja Centralizovano upravljanje svim Check Point uredjajima i resenjima Konzola kojom je jednostavno upravljati [Restricted] for designated teams
8
MOBILE SECURITY – OVERVIEW
Endpoint Security Client Capsule Cloud Mobility Mobile Threat Prevention [Restricted] for designated teams
9
MOBILITY – ENDPOINT SECURITY
Compliance blade = verify status of the endpoint, example: is AV running on the endpoint? Anti Malware blade = anti virus Media encryption blade = encrypt USB sticks to avoid data loss firewall blade = firewall on the endpoint Application control blade = block or allow specific applications to run on the endpoint Full disk encryption blade = encrypt hard drive Remote access VPN blade = VPN client for remote access to corporate network Capsule Docs blade = document encryption client URL filtering blade = URL filtering for the endpoint Anti Bot blade Forensics Blade = monitor changes on the endpoint [Restricted] for designated teams
10
MOBILITY – CAPSULE CLOUD
Light VPN client that connects to Check Point datacenter Windows, OSX All internet traffic from the mobile device is scanned in our datacenters Traffic from a laptop is tunneled over Ipsec to one of our datacenters when we scan the traffic from the laptop to the internet with our security blades (URL filtering, App control, antivirus). We’re using our firewall in the cloud to secure the traffic from the laptop to the internet when the laptop is not in the corporate network Use case = travelers, employees working from home,.. [Restricted] for designated teams
11
MOBILITY – MOBILE TREAT 1/2 PREVENTION
Smartphone and tables ARE computers Analyzes device, application and network behavior IOS and Android Integration with MDM - MTP installs as a client on the smartphone or tablet and scan the devices looking for apps that are malicious [Restricted] for designated teams
12
MOBILITY – MOBILE TREAT 2/2 PREVENTION
Behavioral Risk Engine 2 Risk Score 3 Active Agent 1 Real-Time Intelligence and Control SIEM Integration 4 MDM/EMM Integration On-Device Protection & Mitigation Risk Based Network Protection How it Works 1 Agent runs in background; sends data to Behavioral Risk Engine Analyzes device, application and network detecting attacks Assigns real-time risk score identifying threat level Immediate on-device, MDM and network remediation 2 3 4 [Restricted] for designated teams
13
DATA SECURITY – OVERVIEW
Capsule Workspace Capsule Docs Data security [Restricted] for designated teams
14
DATA SECURITY CAPSULE WORKSPACE 1/2
Secures , calendar and documents on IOS and Android Data is stored in an encrypted container on the mobile device No data loss in case the device is stolen / lost Remote wipe of the container is possible Data is synchronized with Exchange over a secure SSL connection [Restricted] for designated teams
15
DATA SECURITY CAPSULE WORKSPACE 2/2
[Restricted] for designated teams
16
DATA SECURITY - CAPSULE DOCS
Encrypts the whole document Full audit log of the documents Lost documents can’t be read without proper permission Specifies access rights [Restricted] for designated teams
17
[Restricted] for designated teams
DDOS – APPLIANCES 7 models Not pattern based but adaptive learning engine Creates a baseline of normal traffic Takes action when there is a deviation from the baseline Can detect a flash crowd (sudden increase of clean traffic) Most important feature is the adaptive learning engine: the device will “learn” the normal traffic this enables the appliance to filter out ddos traffic Therefore the appliance needs to be installed at least 1 week (so it can learn what “normal” traffic) is before it can be used to stop ddos traffic The longer it is installed the better the results [Restricted] for designated teams
18
[Restricted] for designated teams
Security Checkup Besplatna usluga Najbolji nacin da korisnik upozna Check Point, kao i da mi upoznamo infrastrukturu korisnika i predlozimo optimalno resenje [Restricted] for designated teams
19
hvala! pitanja? [Restricted] for designated teams
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.