Download presentation
Presentation is loading. Please wait.
Published byAshlyn Walters Modified over 9 years ago
1
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010
2
2 2©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion
3
3 3©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion
4
4 4©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security today Our current portfolio R73 (HFA1) Abra Mobile clients (VPN, Encryption)
5
5 5©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 Evolution 2007 2004200820092010 Unified Client Project
6
6 6©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 Unified Endpoint Protection Best of breed Components ► Data Security ► Network Security ► Remote Access components Provides full security coverage Flexible & Modular Deploy what you need now, add what you need in the future Multiple component and suite deployment options
7
7 7©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 – Data Security Full Disk Encryption protects data at rest Combines full hard drive encryption and pre-boot authentication Media Encryption protects your removable medias Combines Media Encryption and Port Protection
8
8 8©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 HFA1 – Network Protection Not just a firewall Innovative Network Protection Technologies Program Advisor, WebCheck Complementary Anti-Malware Award-winning, high-performance
9
9 9©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 HFA1 - Remote Access Choice of two VPN clients: Endpoint Connect ► Smart connection, whatever the network or connectivity challenges ► Transparent “in the office” user experience ► Embedded hot-spot handling ► 32- and 64-bit client support Legacy SecureClient ► Ensuring topology and deployment compatibility
10
10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 – New features Support of Windows 7 New Anti Malware engine ME new features Serial ID device filtering Nero v9+ support for CD/DVD encryption Local File & Folder Encryption FDE Support of IRRT enabled laptops (Dell E-Series) Improved client-side performance
11
11 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Fast User Experience Lowest CPU and Memory Utilization Check Point McAfee Symantec Check Point McAfee Symantec System Boot Time Memory footprint 130 - 100 - 70 - 40 - 10 - Seconds Endpoint and Data Security on Windows XP SP3 Source: Check Point Labs 175 - 160 - 145 - 130 - 115 - Megabytes
12
12 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Fast User Experience Fastest Anti-malware Scan Time Check Point McAfee Symantec Check Point McAfee Symantec Anti-malware INITIAL scan time Anti-malware RECURRING scan time 1600 - 1200 - 800 - 400 - 0 - Seconds Anti-malware tests on Windows 7 Source: Check Point Labs 1600 - 1200 - 800 - 400 - 0 - Seconds
13
13 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 HFA1 – What's new Support of Windows Server 2003 and 2008 32bit FDE new features Supports latest intel chipset Supports hibernation on 64bits OS ME new features Encrypted client-side logs & profiles Temp folder drive/location definition Remote Help for non-AD users WebRH AD integration Support of SQL Server 2008 SA new features Server Support for Anti-malware Check Point R71 management support
14
14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Abra R70 Turn any PC into a corporate desktop USB-based form factor with HW/SW encryption Requires no admin, host OS, or reboot On- and off-line working modes supported Keep mobile data secure Secure Workspace isolates/protects data from host Central SW policy controls applications & features Maintain secure connectivity Provide flexible, secure access to corporate resources, info repositories, and applications Leverage existing CP gateway protections/features
15
15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Mobile Clients VPN client is available on the following platforms: Windows Mobile Symbian And now iPhone (SecureConnect) Encryption is available on the following: Windows Mobile Symbian
16
16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion
17
17 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80 Evolution 2007 2004200820092010 Unified Management Project Unified Client Project 2,5 years of development
18
18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | A new era in Endpoint Security! Central Management Simple, Flexible Enhanced Monitoring
19
19 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Unique Core Values Truly Unified Management Organization-centric Management Simple, efficient policy definition Flexible client deployment Enhanced Monitoring Leveraging CP Infrastructure Comprehensive & Innovative
20
20 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Truly Unified Management ► All endpoint blades and policies managed from the same place ► Consistent look and feel ► No nested admin console ► One component to install ► All endpoint blades and policies managed from the same place ► Consistent look and feel ► No nested admin console ► One component to install
21
21 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Organization-Centric Management ► Assignment Policy Model based on organization ► Policies can be assigned based on connectivity state and/or compliance level ► Leverage current AD architecture to manage & monitor endpoints ► Assignment Policy Model based on organization ► Policies can be assigned based on connectivity state and/or compliance level ► Leverage current AD architecture to manage & monitor endpoints
22
22 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Simple, Efficient Policy Definition ► Best practice out of the box policies protect endpoints quickly ► Advanced configuration options always available for added granularity ► Best practice out of the box policies protect endpoints quickly ► Advanced configuration options always available for added granularity
23
23 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Flexible Client Deployment ► Ability to create MSI package for deployment ► Device Agent only or featured package ► Full handling of client deployment based on policy ► Ability to create MSI package for deployment ► Device Agent only or featured package ► Full handling of client deployment based on policy
24
24 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Enhanced Monitoring ► Full view on current endpoint status and events ► Customizable & Exportable ► Adaptable Drill-down reporting based on organization level ► Full view on current endpoint status and events ► Customizable & Exportable ► Adaptable Drill-down reporting based on organization level
25
25 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Leveraging CP Infrastructure ► Combined Network & Endpoint Log Management provides total security view – useful for compliance ► Sharing of Network Objects and Administration provides stronger, simpler security ► Combined Network & Endpoint Log Management provides total security view – useful for compliance ► Sharing of Network Objects and Administration provides stronger, simpler security
26
26 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Comprehensive and Innovative ► Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security ► Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing ► Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security ► Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing
27
27 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion
28
28 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Conclusion Check Point continues to improve its portfolio with innovative and performant solutions R73, Abra, SecureConnect for iPhone Later this year, R80 will bring us to a new way of managing Endpoint Security After being the first one to release a (really) unified client to the market, no doubt that we will be the first one to release a (really) unified management
29
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Questions?
30
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Thank you!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.