Download presentation
Presentation is loading. Please wait.
Published byEvangeline Cummings Modified over 9 years ago
1
©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS & IDEAS FROM THE FIELD
2
©2015 Check Point Software Technologies Ltd. 2 What’s driving Security Spending ? Upgrade of existing, aged equipment Consolidation of multiple point products Consolidation + New Security Features Compliance Executive Support & Demand for ITSec Security Readiness – Where are you ?
3
©2015 Check Point Software Technologies Ltd. 3 Security is now Mainstream IT Redefinition of the Enterprise: Remote Locations ( Mfg / Branches/ IP devices) Mobile Devices ( where is the “Edge” ? ) A Good Offense is the Best Defense: Advanced Threat Protection = Known & Unknown Reporting & Forensics = SOC & Trending Data +Context + Visibility = Actionable Intelligence
4
©2015 Check Point Software Technologies Ltd. 4 Security Trends ** Redefine the Enterprise: Remote sites & Mobile **Client Execs involved at a new level ** Security Readiness Data : Dashboard, Detail & Forensics Product Enterprise Security Strategies Monitor / ReactProactive / Trend User Involvement
5
©2015 Check Point Software Technologies Ltd. 5 Security has been underfunded… By other valid IT & Business Priorities including: IP Telephony / Unified Communications Storage & Server Virtualization; Converged Computing SAP, Oracle, other applications SF.com & other CRM systems Cloud & Hybrid Data Center Initiatives Impact to Security: Most are in Catch Up Mode Security is “MainStream” Key issues: Personnel / Organizational Structure Policy ( Social media, Document Retention, Breach planning ) Strategy ( Current State to Future State )
6
©2015 Check Point Software Technologies Ltd. 6 [Restricted] ONLY for designated groups and individuals
7
©2015 Check Point Software Technologies Ltd. 7 [Restricted] ONLY for designated groups and individuals Self Assessment Start Here
8
©2015 Check Point Software Technologies Ltd. 8 Client Assessments: Work to be Done 1 st Key Question : “Where am I today?” Follow up questions: Desired Future State First Priority What’s possible today Where do I start
9
©2015 Check Point Software Technologies Ltd. 9 Minimize Risk & Shorten the Curve Have a Current State – Future State roadmap Anticipate Future Requirements ( Leads to proper sizing ). Consider a “Good – Better – Best “ architectural review Invest in Training.
10
©2015 Check Point Software Technologies Ltd. 10 High Level Security Planning Framework - 4 things Infrastructure Threat Mobility Management & Visibility
11
©2015 Check Point Software Technologies Ltd. 11 [Restricted] ONLY for designated groups and individuals Fewer Suppliers & Maintenance contracts More control & reporting Fewer Suppliers & Maintenance contracts More control & reporting DLP Software Blade Application Control Software Blade IPS Software Blade Firewall and VPN Software Blades URL Filtering Software Blade Antivirus & Anti-Malware Software Blade Identity Awareness Software Blade Anti-Bot Software Blade Infrastructure Consolidation is real but you own Architecture
12
©2015 Check Point Software Technologies Ltd. 12 Granular Control of All Security Layers Granular Visibility Identity Awareness DLP Mobile Access SmartEvent IPS Anti-Bot Antivirus Application Control URLF
13
©2015 Check Point Software Technologies Ltd. 13 Check Point Research Industry Feeds Sensors & Sites Priority: Keep System Software Current
14
©2015 Check Point Software Technologies Ltd. 14
15
©2015 Check Point Software Technologies Ltd. 15 One of the most dynamic areas of Security Threat Prevention
16
©2015 Check Point Software Technologies Ltd. 16 Known ( IPS / IDS / URL / App ) Unknown ( SandBox / Zero Day / APT ) Email & Mobile Reporting / Context / Forensics / Trending
17
©2015 Check Point Software Technologies Ltd. 17 Polymorphic Malware APTs Mobility We Spend Time and Budget On.. While Positioning for Future Challenges TODAY’S INFRASTRUCTURE FUTURE ATTACK VECTORS Firewall VPN IPS Anti-Spam URL Filtering Anti-Virus DDoS Have the Platform Built 1 st !!
18
©2015 Check Point Software Technologies Ltd. 18 Multi-Layer Threat Prevention Known and Unknown Malware Known Unknown X XXXXXX XX Known Industry Feeds Global Sensor Data Check Point Research ThreatCloud Emulation Service
19
©2015 Check Point Software Technologies Ltd. 19 [Protected] Non-confidential content INSPECT EMULATE PREVENT SHARE “Threat” requires a holistic view ** New CPU level solution – Stop before threats get to the OS level. Managing Unknowns Sandbox Quarantine Emulation
20
©2015 Check Point Software Technologies Ltd. 20 HIGHEST CATCH RATE Check Point Threat Emulation CPU-Level Threat Prevention + INTEGRATED WITH CHECK POINT THREAT EMULATION UNIQUE AND INNOVATIVE DETECTION
21
©2015 Check Point Software Technologies Ltd. 21 [Restricted] ONLY for designated groups and individuals You can’t manage what you can’t measure Optics & Reporting
22
©2015 Check Point Software Technologies Ltd. 22 What happens when things go wrong ? Event Management Log Management Security Management Management Integrated / Correlated Built-In Compliance Engin e Simplicity & Power in One Plate of Glass
23
©2015 Check Point Software Technologies Ltd. 23 SPOG Management & Visibility
24
©2015 Check Point Software Technologies Ltd. 24 360 o Visibility of Network Security Time shows topline security events Map shows origin of attacks and threats Rate and frequency of potential attacks Important security events highlighted
25
©2015 Check Point Software Technologies Ltd. 25 [Restricted] ONLY for designated groups and individuals Mobility
26
©2015 Check Point Software Technologies Ltd. 26 Today’s Mobile Solutions have Security Gaps [Restricted] ONLY for designated groups and individuals How do you protect devices from THREATS? How do you protect DATA wherever it goes? MDM = Management NOT Security Mobile Security Same policies as On Net APT protection Document Security Mgt & Reporting
27
©2015 Check Point Software Technologies Ltd. 27 Customers are still looking for a solution 70 % of enterprises see mobile support to employees as critical priority 50 % of firms see implementing a BYOD policy as critical priority 75 % of large enterprises will have deployed technologies to secure access to enterprise resources by 2016 Forrester Gartner [Restricted] ONLY for designated groups and individuals
28
©2015 Check Point Software Technologies Ltd. 28 [Restricted] ONLY for designated groups and individuals Has your mobile device been used … 71% of adults over 18 have a Facebook account 2 Facebook? [Restricted] ONLY for designated groups and individuals Over 30% of parents let their kids use their corporate devices 1 To access Dropbox? 1 in 5 employees use consumer cloud storage for work documents 3 By your kids? 1 2013 Norton Report, Oct 2013, by Symantec 2 2013 Pew Research Center Internet Project Tracking Survey 3 Nasuni Survey of 1300 business users as reported by GigaOm
29
©2015 Check Point Software Technologies Ltd. 29 ©2014 Check Point Software Technologies Ltd. 29 Infection or Loss … Easy as 1, 2, 3 SURF THE INTERNET UPLOAD FILES TO THE CLOUD FORGET DEVICE
30
©2015 Check Point Software Technologies Ltd. 30 Vision: Enterprise = 100% of the Enterprise ©2014 Check Point Software Technologies Ltd. 30 [Restricted] ONLY for designated groups and individuals Mobile Security must be part of the Strategy Mobile Security Single solution End to end protection APT protection Reporting & Forensics Intuitive UI
31
©2015 Check Point Software Technologies Ltd. 31 The Internet So many points of entry!
32
©2015 Check Point Software Technologies Ltd. 32 The Issues are Real The Solutions are Many Assess – Plan – Execute For the entire Enterprise Hold the industry accountable Network& Idea share ! Don’t overthink it: get after it! Final Thoughts
33
©2015 Check Point Software Technologies Ltd. 33 Everyone has a plan ‘till they get punched in the mouth Mike Tyson
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.