Download presentation
Presentation is loading. Please wait.
Published byMadeleine Snow Modified over 9 years ago
1
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point in the Finance Sector Case Studies
2
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Enterprise Management
3
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Meeting the Business Needs … No physical boundaries in Corporate networks Business requires authorized access anytime - anywhere - (24x7x365) Expectations are for higher levels of speed and transparency Requires enterprise wide security policies / services to effectively manage risks.
4
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Firewall Services / Electronic Transactions WEB Browsing - HTTP (Hypertext Transfer Protocol) –Electronic Transactions: Instantly Generate Auto Loan Payments, Generate Multi-Term Payment Quotes, and Generate Car Lease Quotes Secured WEB Browsing - HTTPS (Hypertext Transfer Protocol Secured) –Electronic Transactions: Apply for a car loan application, car lease, and inquiries in a secured manner for mortgage banking rates
5
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Firewall Services / Electronic Transactions Cont. Mail - SMTP (Simple Mail Transfer Protocol) –Electronic Transactions: Send and receive mail to your customers Electronic File Distribution - FTP (File Transfer Protocol) –Electronic Transactions: Transfer bank payroll for customer accounts, and transfer letters to your customers
6
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential To Meet the Demands... Deployed 8 Internet DMZs in strategic geographic locations Deployed 6 Extranet DMZs in strategic geographic locations Deployed 4 development labs in strategic geographic locations Deployed 1 Staging DMZ for quality assurance
7
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Dresdner Bank Corporate VPNs
8
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Challenges of VPNs Access Controls Isolation Policy Privacy Identity Administration Availability and Quality of ServiceSecurity Costs
9
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Strategy of Dresdner Bank Group Global and Local Corporate VPNs
10
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Case 1 - Corporate Intranet VPN
11
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Wrapping Up Why Corporate VPNs? We can’t control external Networks and Systems Many Threads from Hackers, Crackers, Cyberjunkies and Active Content Data may be modified during Transmit Unauthorized Access to classified Data What kind of VPNs? Intranet VPNs Extranet VPNs Remote Access VPNs Combinations
12
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Closing Words Just use VPNs! Otherwise, your business will soon be...
13
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Dow Jones
14
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Corporate Facts Founded in 1882 by Charles H. Dow, Edward T. Jones and Charles Bergstresser Headquarters: –200 Liberty Street, New York, New York Preliminary 2000 Revenue: –$ 2.32 Billion Preliminary 2000 Net Income: –$ 294.6 Million Worldwide Employees: –8,100 Listed NYSE, DJ Dow Jones
15
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Our Challenge Build a new corporate infrastructure Major objectives –Internet Access –Access to Parent Company Resources –24x7x365 Availability –Secure Remote Access over the Internet –Protect Parent Company Dow Jones
16
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential High Level Solution Security Requirement: –Firewall of choice must meet ICSA, and DOD criteria for a firewall. –Check Point VPN-1 meets that requirement. Ease of Manageability: –Must have a user friendly graphical interface. –Check Point VPN-1 meets that requirement. Must be capable of generating log files: –Check Point VPN-1 meets that requirement. Dow Jones
17
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential High Level Solution Firewall must support a VPN: –Check Point VPN-1 meets that requirement with SecuRemote. Firewall must support hardware based encryption: –NOKIA IP-650 meets that requirement. Firewall hardware must be easy to configure and maintain: –NOKIA IP-650 meets that requirement. Dow Jones
18
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Benefits Gained Fast, reliable Internet access. Secured access to parent companies resources (Expense System, HR and AP system). This provides the new company a significant cost savings. Remote access allows the sales force secured access to all corporate resources. Dow Jones
19
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential eBanka Customer needs met –Connect remote branch offices –Allow eBanka customers to securely access information via the Internet Check Point products implemented –VPN-1 Pro –VPN-1 SecureClient –SmartCenter
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.